General
-
Target
DraftdocPIITS15235.vbs
-
Size
2.2MB
-
Sample
250218-xwla1awnbn
-
MD5
82fe72e4395ab69063ae37812e097fa5
-
SHA1
96692be9dcd400a38be42fc651d755f41d923efc
-
SHA256
8c4334177584d7aee981ada042ff60124cd81a2e51e7c1514f7e2dd22f9335b4
-
SHA512
6866381b3c83d5516dc3ac34262d877714494cc6bcfd90fbc47214c94fe0e00bc8757ca06ab775e05362481d64fd11279a460d51be7d513b19150525010caa5a
-
SSDEEP
49152:jQ901eMu/JNdX1kXGyMaODU9cXx1YY0YYYYKYYcYYYfLtYsYYYtY/YYYYUFYYcY+:Q
Static task
static1
Behavioral task
behavioral1
Sample
DraftdocPIITS15235.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DraftdocPIITS15235.vbs
Resource
win10v2004-20250217-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.irco.com.sa - Port:
587 - Username:
[email protected] - Password:
info12A
Extracted
vipkeylogger
Targets
-
-
Target
DraftdocPIITS15235.vbs
-
Size
2.2MB
-
MD5
82fe72e4395ab69063ae37812e097fa5
-
SHA1
96692be9dcd400a38be42fc651d755f41d923efc
-
SHA256
8c4334177584d7aee981ada042ff60124cd81a2e51e7c1514f7e2dd22f9335b4
-
SHA512
6866381b3c83d5516dc3ac34262d877714494cc6bcfd90fbc47214c94fe0e00bc8757ca06ab775e05362481d64fd11279a460d51be7d513b19150525010caa5a
-
SSDEEP
49152:jQ901eMu/JNdX1kXGyMaODU9cXx1YY0YYYYKYYcYYYfLtYsYYYtY/YYYYUFYYcY+:Q
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2