General
-
Target
1817a7661c198619d6cedcaf58cdaa63f3195551edb1597f4c3c3497799d42d7.vbs
-
Size
183KB
-
Sample
250219-c1ezkavlgz
-
MD5
f545e8be6220242acf3b735f153d0650
-
SHA1
bf5df9d7432b38159c1ca101e1df8c292cedcac0
-
SHA256
1817a7661c198619d6cedcaf58cdaa63f3195551edb1597f4c3c3497799d42d7
-
SHA512
96a2f504b6af6cb4a2ac4a787049731487c76a8979f323cd3284b27654ff3a58d6fae24111d911e2caa12f0f9a6efa0766d7ef670d68277ced5b2f1d0724d84d
-
SSDEEP
3072:chvVIewt1Dp4PfXVtKYGyCjc9fP0Fb9+DPvv1e:wvVTKYGyCR
Static task
static1
Behavioral task
behavioral1
Sample
1817a7661c198619d6cedcaf58cdaa63f3195551edb1597f4c3c3497799d42d7.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1817a7661c198619d6cedcaf58cdaa63f3195551edb1597f4c3c3497799d42d7.vbs
Resource
win10v2004-20250217-en
Malware Config
Extracted
Protocol: smtp- Host:
turkey.ipchina163.com - Port:
587 - Username:
[email protected] - Password:
!YxP!%1gFh=G
Extracted
vipkeylogger
Protocol: smtp- Host:
turkey.ipchina163.com - Port:
587 - Username:
[email protected] - Password:
!YxP!%1gFh=G - Email To:
[email protected]
Targets
-
-
Target
1817a7661c198619d6cedcaf58cdaa63f3195551edb1597f4c3c3497799d42d7.vbs
-
Size
183KB
-
MD5
f545e8be6220242acf3b735f153d0650
-
SHA1
bf5df9d7432b38159c1ca101e1df8c292cedcac0
-
SHA256
1817a7661c198619d6cedcaf58cdaa63f3195551edb1597f4c3c3497799d42d7
-
SHA512
96a2f504b6af6cb4a2ac4a787049731487c76a8979f323cd3284b27654ff3a58d6fae24111d911e2caa12f0f9a6efa0766d7ef670d68277ced5b2f1d0724d84d
-
SSDEEP
3072:chvVIewt1Dp4PfXVtKYGyCjc9fP0Fb9+DPvv1e:wvVTKYGyCR
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-