General
-
Target
MT103-8819006.DOCS.vbs
-
Size
13KB
-
Sample
241126-jwkgtaymdq
-
MD5
a2dc941889770cb179129bf7cb89bdff
-
SHA1
08a0a77a3754e6bee435810785802e0d054ce46b
-
SHA256
9b8e6b4547ae0f5a3e4af5a94282ccd5bcbb464dabe75ec564315cd768d25806
-
SHA512
e5495fe46ac92d0e92913c750224435e013e62def24f32781802964b66ee343d5bb8724f337c478eabc428a59e42a955b5f1f879463b0d8bc45803720b062006
-
SSDEEP
192:REpO+HDu/0/Jutko/4jos+9/uHLGHRkfkX:REs+AftkW8p+9/urGHRk8X
Static task
static1
Behavioral task
behavioral1
Sample
MT103-8819006.DOCS.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MT103-8819006.DOCS.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c
https://3105.filemail.com/api/file/get?filekey=shTPHbCPX8o-lOtCqHLG6_0xCy-xl4tnxlAVbQ95-dviTK5cARaNdQjbb3mexfwQzKmTXg&skipreg=true&pk_vid=e0109638c9bfb9571732531309b5ff7c
Extracted
vipkeylogger
Targets
-
-
Target
MT103-8819006.DOCS.vbs
-
Size
13KB
-
MD5
a2dc941889770cb179129bf7cb89bdff
-
SHA1
08a0a77a3754e6bee435810785802e0d054ce46b
-
SHA256
9b8e6b4547ae0f5a3e4af5a94282ccd5bcbb464dabe75ec564315cd768d25806
-
SHA512
e5495fe46ac92d0e92913c750224435e013e62def24f32781802964b66ee343d5bb8724f337c478eabc428a59e42a955b5f1f879463b0d8bc45803720b062006
-
SSDEEP
192:REpO+HDu/0/Jutko/4jos+9/uHLGHRkfkX:REs+AftkW8p+9/urGHRk8X
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-