General
-
Target
dfcugh.vbs
-
Size
13KB
-
Sample
241107-tg9hhavgnl
-
MD5
4f3e6d1619f31390de9a461391f10dba
-
SHA1
9d90fa6b3bb7809fc800751c6cfc41dc68742a84
-
SHA256
2202962f09e94846b9677dda2358f0f04871bcd02c6ac3c5f3f27e85982d26c6
-
SHA512
f609e24d91a9ee08fe9b89f4909eb8745045d67b0b20d187d4586f5c382cefc2af96baacd1125aef96b71cc4eeeefdf0baa4467a1bb66637edfedacca9615427
-
SSDEEP
384:CiQvc9iQZ4T6+wi7Ahrd5RxEA/mywQfD6U512ChMsB+5wZ/f3CPR:CiQk9iQzn512ChMsB+4/fyPR
Static task
static1
Behavioral task
behavioral1
Sample
dfcugh.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dfcugh.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
Extracted
vipkeylogger
Targets
-
-
Target
dfcugh.vbs
-
Size
13KB
-
MD5
4f3e6d1619f31390de9a461391f10dba
-
SHA1
9d90fa6b3bb7809fc800751c6cfc41dc68742a84
-
SHA256
2202962f09e94846b9677dda2358f0f04871bcd02c6ac3c5f3f27e85982d26c6
-
SHA512
f609e24d91a9ee08fe9b89f4909eb8745045d67b0b20d187d4586f5c382cefc2af96baacd1125aef96b71cc4eeeefdf0baa4467a1bb66637edfedacca9615427
-
SSDEEP
384:CiQvc9iQZ4T6+wi7Ahrd5RxEA/mywQfD6U512ChMsB+5wZ/f3CPR:CiQk9iQzn512ChMsB+4/fyPR
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-