General
-
Target
SUPER ROYAL SEAFOODS RFQ4252394 TIGER BRAND COOKED PEELED SHRIMPS.gz
-
Size
47KB
-
Sample
241009-jzxasawhrr
-
MD5
e25c3b0b59cb9fdee5ddb84e8af09cca
-
SHA1
510110f30322634115c4687d49c224ac18eef823
-
SHA256
d767e8c8f60037613b30b1d9ada562c66553ce5b640a33a7b33e96278b2c14d9
-
SHA512
3c6d907fe60559211f7781f32e9792f8d7b5bdfbd2b95c9b4e248b1f96f5ac200b19399b485a10dc4c782855832bf9cf8f2d73c195ca2938233c9cc3d622f7f5
-
SSDEEP
768:l5Lwd+VEISSgm2giG72U4HNpCiJc/J/MTF0bW0LMy/5Dl3qPy15DSsyFJyXdUksl:4sVbgNgYU4NpCoI+Obe+5D9qPymsGCdc
Static task
static1
Behavioral task
behavioral1
Sample
SUPER ROYAL SEAFOODS RFQ4252394 TIGER BRAND COOKED PEELED SHRIMPS.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SUPER ROYAL SEAFOODS RFQ4252394 TIGER BRAND COOKED PEELED SHRIMPS.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.lamela.si - Port:
587 - Username:
[email protected] - Password:
2014viks5961lamela - Email To:
[email protected]
Targets
-
-
Target
SUPER ROYAL SEAFOODS RFQ4252394 TIGER BRAND COOKED PEELED SHRIMPS.vbs
-
Size
97KB
-
MD5
e87c0eb3faf117b1da8da391eeda594d
-
SHA1
882f81e1affeef2a61514531a2530744db0e3057
-
SHA256
c23ce63e10c0e2830f689131779734a7664869c1387dc8809eee9505ee42770c
-
SHA512
3d6d6a83eea102614a55d2532e08374239c95a07d16ecf4ffbf7ff6c4fe14b53954240a92b2c64d5c4d004e05ca1191a1ba6ed2d6519f1b1be9e151837c2b463
-
SSDEEP
1536:Q3GsFjLC4sU81EiZ4vDJKIjLLfzXnsfTMGzr0HBEdD5X6/ozz:wGWLjkEi2vDbjXbsfTlHsyDYiz
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-