General
-
Target
0bdcef1bfa0aaab36d678b6615963b6a1f536cfb2216c6d76186476375c05e8c
-
Size
9KB
-
Sample
241104-ggpf4swarm
-
MD5
faf7883ef485374a57cb9c18b52c033c
-
SHA1
18aed625d32a3c3086ee992183bb13a497404a90
-
SHA256
0bdcef1bfa0aaab36d678b6615963b6a1f536cfb2216c6d76186476375c05e8c
-
SHA512
bc61bc451af5880f3751155dd2ddc53f31b01a237382999f71e83b28235ba4e26891db55574054dd92de254d62ad4f2abdae3b476e8a2945030a45dd1c52d06a
-
SSDEEP
192:hbhxBZoB0vn89F8J8zUcCCZ3ZXIYvw6/JpZ0KWOPMMSQp3bru42KihPUUjNngSR0:hbXBZouvOAwZpX9V3eELEtsCnXR0
Static task
static1
Behavioral task
behavioral1
Sample
Request for Quotation_MYMRT.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Request for Quotation_MYMRT.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.jacopopacchioni.com - Port:
587 - Username:
[email protected] - Password:
Ct2mZ=B-7tCC2019
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.jacopopacchioni.com - Port:
587 - Username:
[email protected] - Password:
Ct2mZ=B-7tCC2019 - Email To:
[email protected]
Targets
-
-
Target
Request for Quotation_MYMRT.vbs
-
Size
33KB
-
MD5
f61450af7a076afae98ccd4c8d6b8184
-
SHA1
4fa061cf9880257caaf3208f4963df4461a3cb56
-
SHA256
d5d4fab81408eb3fcceeaebae060cc5d1d275139c52f17659998325fd5b7a76b
-
SHA512
925fa6cc8e2db1c850780627610de88f612a20c5945154dcb68f603b3ea3430a68962533e310daa5d1d158e14fb0ca2ed4be2b2f5ec92e45c97a7975e750ca31
-
SSDEEP
384:G7O2zToyVATbhB2DxCjbb89g8PhQX71nUK8g7qBfQXa:GrIyM7XfeZQLVugI
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-