General

  • Target

    Order 54004308 - DewertOkin.vbs

  • Size

    34KB

  • Sample

    241104-skl1ya1maw

  • MD5

    a170d3802bb9947d9ed54d4b20208e4d

  • SHA1

    a03ba66fa635baba9244e1eac3f99b269f613635

  • SHA256

    9ebf7ae41cdb079bda5c648a1511abb0cb72357d62566011fd463241a6edb62a

  • SHA512

    9aa17a1eb72e3898c3298f130ebbdbe7354ca06dd6882336c86a83039150742b6e399e40a57c6bb2ea007b2a326cc742e2172987651b8e896aae34002185fbfc

  • SSDEEP

    192:ALwiULy4CrB+UhzT+cDWpvdGrlzNb6+HjUpDUShGY/eSQKLx0xTkow:aiy4qptDWponb69pD5hBmSmTI

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.singhalenterprise.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    balkishan@123

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      Order 54004308 - DewertOkin.vbs

    • Size

      34KB

    • MD5

      a170d3802bb9947d9ed54d4b20208e4d

    • SHA1

      a03ba66fa635baba9244e1eac3f99b269f613635

    • SHA256

      9ebf7ae41cdb079bda5c648a1511abb0cb72357d62566011fd463241a6edb62a

    • SHA512

      9aa17a1eb72e3898c3298f130ebbdbe7354ca06dd6882336c86a83039150742b6e399e40a57c6bb2ea007b2a326cc742e2172987651b8e896aae34002185fbfc

    • SSDEEP

      192:ALwiULy4CrB+UhzT+cDWpvdGrlzNb6+HjUpDUShGY/eSQKLx0xTkow:aiy4qptDWponb69pD5hBmSmTI

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks