General
-
Target
9ebf7ae41cdb079bda5c648a1511abb0cb72357d62566011fd463241a6edb62a.vbs
-
Size
34KB
-
Sample
241105-elz3astglh
-
MD5
a170d3802bb9947d9ed54d4b20208e4d
-
SHA1
a03ba66fa635baba9244e1eac3f99b269f613635
-
SHA256
9ebf7ae41cdb079bda5c648a1511abb0cb72357d62566011fd463241a6edb62a
-
SHA512
9aa17a1eb72e3898c3298f130ebbdbe7354ca06dd6882336c86a83039150742b6e399e40a57c6bb2ea007b2a326cc742e2172987651b8e896aae34002185fbfc
-
SSDEEP
192:ALwiULy4CrB+UhzT+cDWpvdGrlzNb6+HjUpDUShGY/eSQKLx0xTkow:aiy4qptDWponb69pD5hBmSmTI
Static task
static1
Behavioral task
behavioral1
Sample
9ebf7ae41cdb079bda5c648a1511abb0cb72357d62566011fd463241a6edb62a.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9ebf7ae41cdb079bda5c648a1511abb0cb72357d62566011fd463241a6edb62a.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.singhalenterprise.com - Port:
587 - Username:
[email protected] - Password:
balkishan@123
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.singhalenterprise.com - Port:
587 - Username:
[email protected] - Password:
balkishan@123 - Email To:
[email protected]
Targets
-
-
Target
9ebf7ae41cdb079bda5c648a1511abb0cb72357d62566011fd463241a6edb62a.vbs
-
Size
34KB
-
MD5
a170d3802bb9947d9ed54d4b20208e4d
-
SHA1
a03ba66fa635baba9244e1eac3f99b269f613635
-
SHA256
9ebf7ae41cdb079bda5c648a1511abb0cb72357d62566011fd463241a6edb62a
-
SHA512
9aa17a1eb72e3898c3298f130ebbdbe7354ca06dd6882336c86a83039150742b6e399e40a57c6bb2ea007b2a326cc742e2172987651b8e896aae34002185fbfc
-
SSDEEP
192:ALwiULy4CrB+UhzT+cDWpvdGrlzNb6+HjUpDUShGY/eSQKLx0xTkow:aiy4qptDWponb69pD5hBmSmTI
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-