Vipasana ransomware

Forum for analysis and discussion about malware.
Post Reply
User avatar
Posts: 198
Joined: Fri Aug 27, 2010 7:35 am

Vipasana ransomware

Post by Blaze » Wed Feb 03, 2016 3:34 pm

Nothing too special, but feel free to check it out.

Blog: ... block.html



Code: Select all
Samples attached.
You do not have the required permissions to view the files attached to this post.

User avatar
Posts: 44
Joined: Thu Oct 29, 2015 1:09 am

Re: Vipasana ransomware

Post by p1nk » Thu Feb 04, 2016 12:58 am

Request is over HTTP:

T -> [AP]
GET /system/logs/tool/inst.php?vers=CL% HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36

T [AP]
HTTP/1.1 200 OK
Server: nginx
Date: Thu, 04 Feb 2016 00:55:14 GMT
Content-Type: text/html
Content-Length: 10..Connection: keep-alive
Set-Cookie: visitorOfMySite=1; expires=Fri, 05-Feb-2016 00:55:14 GMT
Vary: Accept-Encoding



Looks like the /sender/ argument maps to who send the lure.

Post Reply