General

  • Target

    pago-568092-566534.exe

  • Size

    806KB

  • Sample

    250414-sws9dszlz8

  • MD5

    ee9064c9429ce71f8840108fd27efcde

  • SHA1

    20307672fd0b0f40ad0e6d035445b395578abfae

  • SHA256

    88287f70307150fc1f469bf08e49dee581cdce1900dcf477a08d010e90fef57d

  • SHA512

    fef7fa31a45dfd22ea2bac537f6f97373688698e1d1c7601cbe5e6646def952eb5f5f90302e127c87ce0aaa152f8700c312dc2ca859b329d8d49a4824c145f0d

  • SSDEEP

    24576:7fYuPz30Oo2mDqFscQFAEIoOf7JGpbtg2:jPokeAE9OzUrg2

Malware Config

Extracted

Family

vipkeylogger

C2

https://api.telegram.org/bot7503700665:AAGL8MMCdDcG7tz-eC9bATTNxcDJaBzKQqA/sendMessage?chat_id=7618581100

Targets

    • Target

      pago-568092-566534.exe

    • Size

      806KB

    • MD5

      ee9064c9429ce71f8840108fd27efcde

    • SHA1

      20307672fd0b0f40ad0e6d035445b395578abfae

    • SHA256

      88287f70307150fc1f469bf08e49dee581cdce1900dcf477a08d010e90fef57d

    • SHA512

      fef7fa31a45dfd22ea2bac537f6f97373688698e1d1c7601cbe5e6646def952eb5f5f90302e127c87ce0aaa152f8700c312dc2ca859b329d8d49a4824c145f0d

    • SSDEEP

      24576:7fYuPz30Oo2mDqFscQFAEIoOf7JGpbtg2:jPokeAE9OzUrg2

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Accesses Microsoft Outlook profiles

    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Target

      Undvrligst130.Gul

    • Size

      54KB

    • MD5

      63d3e9e12462b3b7ad4ca8835d3d08bd

    • SHA1

      d9aa8a0fad0c4c9eeb030e4da83b37aae9ae132b

    • SHA256

      1c739a595448826a25d50af246010dbb70fd6a78c5af3316509ff2073e5cad2c

    • SHA512

      8e5e65554e94703b893dcbc210d4d5c0949059eeb0a0e41ec3b16ffc746d5571b74d102c68c286670a2523447c1f9c2cb1a47c3088865bfe9752d744a9578274

    • SSDEEP

      1536:NVi4bqCaM+oZ8nqA3w4mmzuI3gBxNFBD1ed:7izpoZ+5m1CgBDFBD1ed

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v16

Tasks