General

  • Target

    Request For Quotation-RFQ097524.vbs

  • Size

    340KB

  • Sample

    241030-g5gq6syama

  • MD5

    ba22357ab123c78b04b4f0148a35183f

  • SHA1

    716461b95453c6f42b4427817ba38b73f6ba567f

  • SHA256

    8caed4eaea8675db8956fa5783fecc9b9e00399847a4200c666354afd9d665e5

  • SHA512

    764e9e1d4ccfa68c469955325a2959ba6195050f35eacb8a07d591f9377a7bd468a0796c367709852869c76d6d2788b8d890fba2d1c095fe53f90d7bfd06c22d

  • SSDEEP

    6144:En64ik47Q3WAFLOgL6hPnAIjxnH7sjS3xcrl0ZIRN2XrwozRMeqzAv+qmXpiEcIV:ZgcgL8jD/wGmzcspqf7vC/

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Request For Quotation-RFQ097524.vbs

    • Size

      340KB

    • MD5

      ba22357ab123c78b04b4f0148a35183f

    • SHA1

      716461b95453c6f42b4427817ba38b73f6ba567f

    • SHA256

      8caed4eaea8675db8956fa5783fecc9b9e00399847a4200c666354afd9d665e5

    • SHA512

      764e9e1d4ccfa68c469955325a2959ba6195050f35eacb8a07d591f9377a7bd468a0796c367709852869c76d6d2788b8d890fba2d1c095fe53f90d7bfd06c22d

    • SSDEEP

      6144:En64ik47Q3WAFLOgL6hPnAIjxnH7sjS3xcrl0ZIRN2XrwozRMeqzAv+qmXpiEcIV:ZgcgL8jD/wGmzcspqf7vC/

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks