General
-
Target
Scan12112024,pdf.vbs
-
Size
12KB
-
Sample
241112-rmtywsvaqg
-
MD5
4e9b8807134dfb560b0eb3f0bf8705af
-
SHA1
086e955967a78b02bb006f3d2755dfc49c536990
-
SHA256
e3dadda28d21c40c06bcfd1163b6b7d170689976d69a66985fa309197fb49850
-
SHA512
62dc169e27636a9baee657969f0e678b582a6a4a4b595fb242b037be53ab70c410c241d2f3c0b22f64c1bf7ad429fabc6f2705042f43f53dabc13d0e1369e99b
-
SSDEEP
192:spKV/HwG/IUUtbeDQgGHOgy9w3Kjv3H03f7sbcS/7XQx74DGICrZOnips3SkvDA:fV4N//ICrZOnips3Sl
Static task
static1
Behavioral task
behavioral1
Sample
Scan12112024,pdf.vbs
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Scan12112024,pdf.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
https://1017.filemail.com/api/file/get?filekey=2Aa_bWo9Reu45t7BU1kVgsd9pT9pgSSlvStGrnTICfFhmTKj3LC6SQtIcOc_T35w&pk_vid=fd4f614bb209c62c1730945176a0904f
Extracted
vipkeylogger
Targets
-
-
Target
Scan12112024,pdf.vbs
-
Size
12KB
-
MD5
4e9b8807134dfb560b0eb3f0bf8705af
-
SHA1
086e955967a78b02bb006f3d2755dfc49c536990
-
SHA256
e3dadda28d21c40c06bcfd1163b6b7d170689976d69a66985fa309197fb49850
-
SHA512
62dc169e27636a9baee657969f0e678b582a6a4a4b595fb242b037be53ab70c410c241d2f3c0b22f64c1bf7ad429fabc6f2705042f43f53dabc13d0e1369e99b
-
SSDEEP
192:spKV/HwG/IUUtbeDQgGHOgy9w3Kjv3H03f7sbcS/7XQx74DGICrZOnips3SkvDA:fV4N//ICrZOnips3Sl
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-