General

  • Target

    06112024_0158_tenderNo.SHG-00080-EPC2-PDF.vbe.gz

  • Size

    6KB

  • Sample

    241106-cjmcbasgpf

  • MD5

    5d9f8309761f06e33bc45f3703b73b96

  • SHA1

    5823f915c6d29b2b1319438a0beaf04b59c57cda

  • SHA256

    cf509bd6fe32992ce6b8e9a41fd284ec3b31612bfbf4f8451ae16831232fa1f0

  • SHA512

    79f270e370179683a7516b4e7c4331c59b77f101011b03ed45a4fba05c19d5f8482cc652e4a3ea2d6ee909995c27bef3456295e1dadbdf80b44f142e76bd138f

  • SSDEEP

    96:qVrDmPIRxltjStSbMk9DK3YGsRawOYRD2/vJEk0SWMW//5JU3fMtTYggAXQt4PgL:mDcYtk0MkN7fmXakC//56EYdtT/N80

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.pentaprima-adv.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    penta111!

Extracted

Family

vipkeylogger

Credentials

Targets

    • Target

      tender No. SHG-00080 - EPC2 -PDF.vbe

    • Size

      26KB

    • MD5

      5c41205813f5cb6111f7f54c55d79401

    • SHA1

      aded64d5b2fbd084ac1d9bf2916cc30668233636

    • SHA256

      37479a80364231d642aae1e5e2acbd5bd5ed93dce441890200f71f8063420a66

    • SHA512

      fac62621bd79c5befc2fc3c91a25ab185bb7958e3ccd2cf6eae2e736977cd3a4106b3ee38aa56e900b1e62c3f36a8f7dd69b5eff2d3e5a35c75ac1c12fd3aadd

    • SSDEEP

      768:OaRvluL79XDn/C+iV89wKpejmO1d527vkmQs90QtVFyMETjs365KbCXmosBOJ3oJ:V7J+Q0AMLzVZ1

    • VIPKeylogger

      VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.

    • Vipkeylogger family

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks