General
-
Target
Pedido de Cotação -RFQ20241030_Pdf.vbs
-
Size
335KB
-
Sample
241031-n4physwmas
-
MD5
238e440996ccbc86ab7cb078e3952a29
-
SHA1
eee8085b99b27c94b661d1c253bbca2338d07412
-
SHA256
babecadcc173a09c23ee326f8b7a9a1cc9ff1d795ca4e40c686687c8c68c0f99
-
SHA512
ffe36f620486bd3768dcac8c43b7ea8db105d588e73cd5a99e19755c53114bc0ec7df5d1d5599e723ea21f4cea3aed3d3cb869b7d8ac1746da0d52a87bb22e36
-
SSDEEP
6144:En64ik47Q3WAFLOgL6hPnAIjxnH7sjS3xcrl0ZIRN2XrwozRMeqzAv+qmXpiEcIF:ZgcgL8jD/wGmzcspqcqkZb
Static task
static1
Behavioral task
behavioral1
Sample
Pedido de Cotação -RFQ20241030_Pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Pedido de Cotação -RFQ20241030_Pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.recsb.com - Port:
587 - Username:
[email protected] - Password:
1=vI*r6^ - Email To:
[email protected]
Targets
-
-
Target
Pedido de Cotação -RFQ20241030_Pdf.vbs
-
Size
335KB
-
MD5
238e440996ccbc86ab7cb078e3952a29
-
SHA1
eee8085b99b27c94b661d1c253bbca2338d07412
-
SHA256
babecadcc173a09c23ee326f8b7a9a1cc9ff1d795ca4e40c686687c8c68c0f99
-
SHA512
ffe36f620486bd3768dcac8c43b7ea8db105d588e73cd5a99e19755c53114bc0ec7df5d1d5599e723ea21f4cea3aed3d3cb869b7d8ac1746da0d52a87bb22e36
-
SSDEEP
6144:En64ik47Q3WAFLOgL6hPnAIjxnH7sjS3xcrl0ZIRN2XrwozRMeqzAv+qmXpiEcIF:ZgcgL8jD/wGmzcspqcqkZb
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-