General
-
Target
Data Sheet_Technical Requisition.Gz
-
Size
50KB
-
Sample
250226-jclwjayly9
-
MD5
8a176047998d7b3424b7cc5652ce12a4
-
SHA1
4d0ffbc4826031b1f94ed99aa3ea036e50208d37
-
SHA256
120d4f7fffff6a1545c5a6fd2620fb38ea16be8baf365fb25b852859bc193919
-
SHA512
eb7abe455b0946dce351c4cd04cf797ce598585a312a3a032f1d60212273f8fb2dd0e17918f0971de48adcbc62356016a981e26a3770efdfd6a1965d37c57995
-
SSDEEP
1536:oaoCOLxeG7Lsd5B2/zRpnbAO8Fz+a+Rjz:oGooGfsvw7RW+Hhz
Static task
static1
Behavioral task
behavioral1
Sample
Data Sheet_Technical Requisition.vbs
Resource
win7-20240903-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.gtpv.online - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@@ - Email To:
[email protected]
Targets
-
-
Target
Data Sheet_Technical Requisition.vbs
-
Size
97KB
-
MD5
fb96faddeb253f2dc7f5ebc646b9577d
-
SHA1
f99b1242624a2f6fd10675ebcf0d434002132f07
-
SHA256
a1793711d90913e75edd176658b83e254324afc51e54f787aae45062363fb22d
-
SHA512
3c75f19bbdf9b63225928294dbbd76fab2513cc8c225716f9779b49919c204cca5c6fe56fe4a23ca31b96baec337c57099658f762f3d9e68b101236b06b77e53
-
SSDEEP
1536:PIqKuiFeYv5YBGz/tDFcjCf9OiLFRnTTFR1//fyszzooL5DxATTfq/C5DO:PIqKnFlYMz/NFqCf9Dnhrzv6fV5DO
Score10/10-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-