General
-
Target
ZIRAT BANKA.IFT MESAJI
-
Size
1.2MB
-
Sample
200526-67qev7hzae
-
MD5
96463f1796847224b85a96752b59ff17
-
SHA1
ca05cf6c0eac29a22d1296a15804cec36a908347
-
SHA256
1f1e1c079253f774dc02a7ff4e103a781573288802ba8c87af6790626fbcfca6
-
SHA512
cd27c0801d2d33ddb0ce26a769fd51e844f8ac7301079afab3c786822c529cb924b7db7e4a1992af77edf011ad4ffd586191a8754ca3738846605eb67acf3f5c
Static task
static1
Behavioral task
behavioral1
Sample
ZIRAT BANKA.IFT MESAJI.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
ZIRAT BANKA.IFT MESAJI.exe
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\C8A579F880\Log.txt
masslogger
Targets
-
-
Target
ZIRAT BANKA.IFT MESAJI
-
Size
1.2MB
-
MD5
96463f1796847224b85a96752b59ff17
-
SHA1
ca05cf6c0eac29a22d1296a15804cec36a908347
-
SHA256
1f1e1c079253f774dc02a7ff4e103a781573288802ba8c87af6790626fbcfca6
-
SHA512
cd27c0801d2d33ddb0ce26a769fd51e844f8ac7301079afab3c786822c529cb924b7db7e4a1992af77edf011ad4ffd586191a8754ca3738846605eb67acf3f5c
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-