General

  • Target

    Pedido de Cotação -RFQ20241030_Pdf.vbs

  • Size

    335KB

  • Sample

    241031-n4physwmas

  • MD5

    238e440996ccbc86ab7cb078e3952a29

  • SHA1

    eee8085b99b27c94b661d1c253bbca2338d07412

  • SHA256

    babecadcc173a09c23ee326f8b7a9a1cc9ff1d795ca4e40c686687c8c68c0f99

  • SHA512

    ffe36f620486bd3768dcac8c43b7ea8db105d588e73cd5a99e19755c53114bc0ec7df5d1d5599e723ea21f4cea3aed3d3cb869b7d8ac1746da0d52a87bb22e36

  • SSDEEP

    6144:En64ik47Q3WAFLOgL6hPnAIjxnH7sjS3xcrl0ZIRN2XrwozRMeqzAv+qmXpiEcIF:ZgcgL8jD/wGmzcspqcqkZb

Malware Config

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Pedido de Cotação -RFQ20241030_Pdf.vbs

    • Size

      335KB

    • MD5

      238e440996ccbc86ab7cb078e3952a29

    • SHA1

      eee8085b99b27c94b661d1c253bbca2338d07412

    • SHA256

      babecadcc173a09c23ee326f8b7a9a1cc9ff1d795ca4e40c686687c8c68c0f99

    • SHA512

      ffe36f620486bd3768dcac8c43b7ea8db105d588e73cd5a99e19755c53114bc0ec7df5d1d5599e723ea21f4cea3aed3d3cb869b7d8ac1746da0d52a87bb22e36

    • SSDEEP

      6144:En64ik47Q3WAFLOgL6hPnAIjxnH7sjS3xcrl0ZIRN2XrwozRMeqzAv+qmXpiEcIF:ZgcgL8jD/wGmzcspqcqkZb

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks