NOTICE:
ASSOCIATED FILES:
2026-01-09 (FRIDAY): VIP RECOVERY INFECTION FROM EMAIL ATTACHMENT NOTES: - Some sources called this malware "VIP Keylogger," but the data exfiltration emails are labeled "VIP Recovery." INFECTION CHAIN: - email --> attached archive --> extracted VBS file --> retrieves and runs files for VIP Recovery EMAIL INFORMATION: - Received: from slot0.morecft[.]shop (slot0.morecft[.]shop [195.54.161[.]236]) [info removed]; Fri, 09 Jan 2026 06:55:06 (UTC) - From: Ms. Maggie Wu- Subject: Request for Quotation (RFQ) -RFQ/2026/10/26 - Date: 9 Jan 2026 01:55:04 -0500 - Attachment name: Request for Quotation (RFQ) -RFQ20261026.7z EMAIL ATTACHMENT AND EXTRACTED FILE: - SHA256 hash: a51ec9b082b024d863e53505e2bd2276ce2e4f575bf2b8cb3356124a662bfacd - File size: 6,065 bytes - File type: 7-zip archive data, version 0.4 - File name: Request for Quotation (RFQ) -RFQ20261026.7z - SHA256 hash: 7b998e3e817d913700336ceb36e178f39182ca60038f55624383857ab921bc4c - File size: 16,051 bytes - File type: ASCII text, with CRLF, LF line terminators - File name: Documented_Invoice_305.vbs INITIAL TRAFFIC FROM RUNNING THE VBS FILE: - 18:04:43 UTC - TCP port 80 - hxxps[:]//firebasestorage.googleapis[.]com/v0/b/remasd-6c702.firebasestorage.app/o/image.jpg? alt=media&token=[info removed] - 18:04:44 UTC - TCP port 80 - hxxps[:]//1zil1.s3.cubbit[.]eu/don-snake-vipupload.txt FILES FROM THE ABOVE URLS: - SHA256 hash: 573507ffbef1dcbc354c0ae29c71051c8790b4bbd06d71ee6d68078862cf0ab4 - File size: 2,404,423 bytes - File type: JPEG image data - File location: hxxps[:]//firebasestorage.googleapis[.]com/v0/b/remasd-6c702.firebasestorage.app/o/image.jpg?alt=media& token=[info removed] - Note: Image returned fromt he above URL has embedded base64 text. - SHA256 hash: 71773949eb6fa255bd1e633f55127720a1b5ed46ecb28affb7bdd28b625fa4c9 - File size: 3,936,172 bytes - File type: ASCII text, with very long lines (65536), with no line terminators - File location: hxxps[:]//1zil1.s3.cubbit[.]eu/don-snake-vipupload.txt EXE FILES EXTRACTED FROM THE ABOVE FILES - SHA256 hash: f340b73cc89e25e6726a019b3e79c0b491b69b0c54ae3f02ba062879c48253df - File size: 98,304 bytes - File type: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows - File description: EXE from converting base64 text embedded in image from firebasestorage.googleapis[.]com URL - SHA256 hash: 6230ffa50d64f417bc06c469df83110f81af670ac70763b01797638e744ae2a7 - File size: 2,952,129 bytes - File type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows - File description: EXE from reversing and converting base64 text from zil1.s3.cubbit[.]eu URL POST-INFECTION TRAFFIC: - 18:04:48 UTC - TCP port 80 - checkip.dyndns[.]org - GET / - 18:04:49 UTC - TCP port 80 - checkip.dyndns[.]org - GET / - 18:04:49 UTC - TCP port 443 - reallyfreegeoip[.]org - [HTTPS traffic] - 18:04:50 UTC - TCP port 80 - checkip.dyndns[.]org - GET / - 18:04:50 UTC - TCP port 80 - checkip.dyndns[.]org - GET / - 18:04:51 UTC - TCP port 80 - checkip.dyndns[.]org - GET / - 18:04:51 UTC - TCP port 80 - checkip.dyndns[.]org - GET / - 18:04:51 UTC - TCP port 80 - checkip.dyndns[.]org - GET / - 18:04:52 UTC - TCP port 80 - checkip.dyndns[.]org - GET / - 18:04:52 UTC - TCP port 80 - checkip.dyndns[.]org - GET / - 18:04:53 UTC - TCP port 80 - checkip.dyndns[.]org - GET / - 18:04:53 UTC - TCP port 443 - api.telegram[.]org - [HTTPS traffic] - 18:05:00 UTC - 162.254.34[.]31:587 - eraqron[.]com - [unencrypted SMTP traffic] - 18:05:05 UTC - 162.254.34[.]31:587 - eraqron[.]com - [unencrypted SMTP traffic] DATA EXFILTRATION EMAIL ADDRESSES: - Email for sending victim data: rejump@eraqron[.]shop - Email to receive victim data: jump@eraqron[.]shop

Shown above: Screenshot of the email, its attachment, and the VBS file within the attachment.

Shown above: Traffic from the infection filtered in Wireshark.

Shown above: Start of SMTP traffic from one of the data exfiltration emails.
Click here to return to the main page.