General

  • Target

    PO8620801.pdf.z

  • Size

    778KB

  • Sample

    250414-wvl1gawrv9

  • MD5

    312b503c8e705f6ecbc91af83dbf5ae5

  • SHA1

    91f3ebddd6193238a4d3228d04f4c1b88dcd4edd

  • SHA256

    7a397e211c3c81b259dead378527d37b4ddcb9c014f65ddfdb91152b2a8dffdf

  • SHA512

    f0b16ea4559d00aec31cfe8beaa73d1250c0fb2830a8840a3bf56809588886a0c63dca08306db5e254559ee55d0642f41427fb81dac82d1b7d21b35afd6b35e0

  • SSDEEP

    24576:xyhRMmZuTO3/krNXYT+ryxwIx4cTSUb8K+BT/:xyhvyOPKXBVIWnftB7

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.puyehuechile.cl
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Daem2024.

Extracted

Family

vipkeylogger

Credentials
C2

https://api.telegram.org/bot7734343353:AAEmQvfIoOWaFhz75a3JZ6hyXwpiKyq7nnY/sendMessage?chat_id=7049826127

Targets

    • Target

      PO 8620801 .pdf.exe

    • Size

      892KB

    • MD5

      60d3c0ba8ba14dc2070d16baf18a1986

    • SHA1

      244244ab1ebda098d7792eaea063cbad5fb16945

    • SHA256

      77b6742a4beccef32d22a13aa555eb35537265ecc3662f845d48a86dc126c875

    • SHA512

      d3304af1f4e3cc82fa4caa56e100f27efe1276a93697dc5a74ec6e540c3a9a44b1fde5c4ce7e798a1de1b89c88bd6c950f5b397becdf5aa6d476cb7b08263aa6

    • SSDEEP

      12288:Uoi6cfy84PI96XOnna8NymofY/6ZPcnrVGh06v75VZbuOY78cXrzzfdWsYYT:Xi6cWwYsYmoYTrVyl7buOW3zlnf

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks