General

  • Target

    66ef9dcb6a5143453daaeced545c270e3a97de89a3289f7e3effce1540135ee0.vbs

  • Size

    519KB

  • Sample

    241026-b9evgsvpdn

  • MD5

    cc7b8ff842d99296d7ec347eb9678e09

  • SHA1

    40f2d2d3747af208c4feaeb51aca9b1dfcb62000

  • SHA256

    66ef9dcb6a5143453daaeced545c270e3a97de89a3289f7e3effce1540135ee0

  • SHA512

    9b6741e1cc073c4ce8709613da986857388e4844a74279f88cf50324f10916c4e052cdd2e485b9c09f5e33b8e603e6a0504899ac670320a636e89ba15a218368

  • SSDEEP

    6144:De/79XfNb0Z1h/csXSWmT9lBiNo4LSrp17wHWmQUnbzN2TxOiSWGIhEmrm5daIug:2Rc1RYnL4WrUHLhn1XW+mr+yrs96g

Malware Config

Extracted

Family

vipkeylogger

Credentials

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.punoterrahotel.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Titikakapu@2023

Targets

    • Target

      66ef9dcb6a5143453daaeced545c270e3a97de89a3289f7e3effce1540135ee0.vbs

    • Size

      519KB

    • MD5

      cc7b8ff842d99296d7ec347eb9678e09

    • SHA1

      40f2d2d3747af208c4feaeb51aca9b1dfcb62000

    • SHA256

      66ef9dcb6a5143453daaeced545c270e3a97de89a3289f7e3effce1540135ee0

    • SHA512

      9b6741e1cc073c4ce8709613da986857388e4844a74279f88cf50324f10916c4e052cdd2e485b9c09f5e33b8e603e6a0504899ac670320a636e89ba15a218368

    • SSDEEP

      6144:De/79XfNb0Z1h/csXSWmT9lBiNo4LSrp17wHWmQUnbzN2TxOiSWGIhEmrm5daIug:2Rc1RYnL4WrUHLhn1XW+mr+yrs96g

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks