General
-
Target
Scan12112024,pdf.vbs
-
Size
11KB
-
Sample
241112-hhgnbsxcmm
-
MD5
3f17db10010a4ce43a4f0429179c9f55
-
SHA1
0a562aa4ba586163f1016b68e028a77bce000490
-
SHA256
025945e88ff07b6cac99091ea9410351047fa352f29026d5751dc15b63ad1765
-
SHA512
091d320806d48cf57e00ae906756a351405335d594783f3672746f741ca2f650b097c2a5b8970899d8519b6fd4c7331c9296a815c7c481b7257ef39ae92de004
-
SSDEEP
192:8ZRtanUEczOg4ya+7ZKQGd6csBGXSqKRq5O09NhN:y0nUcL6LK
Static task
static1
Behavioral task
behavioral1
Sample
Scan12112024,pdf.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Scan12112024,pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
Extracted
vipkeylogger
Targets
-
-
Target
Scan12112024,pdf.vbs
-
Size
11KB
-
MD5
3f17db10010a4ce43a4f0429179c9f55
-
SHA1
0a562aa4ba586163f1016b68e028a77bce000490
-
SHA256
025945e88ff07b6cac99091ea9410351047fa352f29026d5751dc15b63ad1765
-
SHA512
091d320806d48cf57e00ae906756a351405335d594783f3672746f741ca2f650b097c2a5b8970899d8519b6fd4c7331c9296a815c7c481b7257ef39ae92de004
-
SSDEEP
192:8ZRtanUEczOg4ya+7ZKQGd6csBGXSqKRq5O09NhN:y0nUcL6LK
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-