General
-
Target
CamScanner02-18-20250535.7z
-
Size
36KB
-
Sample
250218-sehrbstlz9
-
MD5
5f5f4475b677ef79f03c92b79c022ae3
-
SHA1
ae4e417bc04f4d9a207a31d7b7655245d7cc07e3
-
SHA256
47c3b0014cc31b4af6bb864d5d0b55b365d173d1328be50d3cddb5bf5aedda8b
-
SHA512
c649eb39db5a5daf378505d593f6deaff7889f4145a017091861628f1bf44544134192d5105aec8937f4094c485b8d39427da02034802bd33c199e18fc2c05b3
-
SSDEEP
768:sAunhRniKnaNRavo3lVmmIPfjSl1VvoRRVePGMZtRZvh0vjLVPA:sAEhZDajVVmmIPLSl1VotATvhOVPA
Static task
static1
Behavioral task
behavioral1
Sample
CamScanner 02-18-20250535.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CamScanner 02-18-20250535.js
Resource
win10v2004-20250217-en
Malware Config
Extracted
https://3005.filemail.com/api/file/get?filekey=nIx_5T0LxHOBjilNb9CRviabPjrW2dlC-LxeOdJPF_Z_1MP6CuQBS5KcptA&pk_vid=342803d1cc4e3b801739359203b5fe9d
https://3005.filemail.com/api/file/get?filekey=nIx_5T0LxHOBjilNb9CRviabPjrW2dlC-LxeOdJPF_Z_1MP6CuQBS5KcptA&pk_vid=342803d1cc4e3b801739359203b5fe9d
Extracted
Protocol: smtp- Host:
142.171.169.81 - Port:
587 - Username:
[email protected] - Password:
!z34db8K4
Extracted
vipkeylogger
Protocol: smtp- Host:
142.171.169.81 - Port:
587 - Username:
[email protected] - Password:
!z34db8K4 - Email To:
[email protected]
Targets
-
-
Target
CamScanner 02-18-20250535.js
-
Size
311KB
-
MD5
0de9fff98db3ba4094c5aa81d6c67423
-
SHA1
c1350fa5569ad8d00231da2cde9955c34757fba5
-
SHA256
554b9322949c5330f897d744e542da4d8db44ec6b193ed36374c386fb8cdb0c0
-
SHA512
1fe18f132389031057617a771dd0aab9fce470156eae586d607da651d7506f8e6d51ba432149db749fd614a58873262fbfae1bc132e10f7b14f1bcdb700a3703
-
SSDEEP
3072:5vJ5HovJ5HovJ5HovJ5H7vJ5HovJ5HovJ5HovJ5H4vJ5HovJ5HovJ5HovJ5HRbUj:soYfL
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-