Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/06/2020, 11:49 UTC

200611-1f13szahtj 10

11/06/2020, 10:57 UTC

200611-hqfde4tdlj 10

General

  • Target

    malo

  • Size

    1.2MB

  • Sample

    200611-1f13szahtj

  • MD5

    3f8fe7595c1021c656ecce69dec78cb3

  • SHA1

    51ebb8881432b24aeea0e593c177ca984a797221

  • SHA256

    995113d1bd7b707244a6d069c51926a7f79bccafcd55aa2fe4563e314d33876a

  • SHA512

    335d0b8067e8775fcd7c8e6e232673602b5b0b50abed55996fb0a79cf68e8a9d9d72e0af2b51f2ceab144b09e9fd107a334e7d0aa3192eb41c8f28957f3dc6d5

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\C8A579F880\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.7.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.13 Location: United States Windows OS: Microsoft Windows 7 Professional 64bit Windows Serial Key: HYF8J-CVRMY-CM74G-RPHKF-PW487 CPU: Persocon Processor 2.5+ GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 6/11/2020 1:50:29 PM MassLogger Started: 6/11/2020 1:50:25 PM Interval: 2 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\malo.exe MassLogger Melt: false MassLogger Exit after delivery: true As Administrator: True Processes:

Targets

    • Target

      malo

    • Size

      1.2MB

    • MD5

      3f8fe7595c1021c656ecce69dec78cb3

    • SHA1

      51ebb8881432b24aeea0e593c177ca984a797221

    • SHA256

      995113d1bd7b707244a6d069c51926a7f79bccafcd55aa2fe4563e314d33876a

    • SHA512

      335d0b8067e8775fcd7c8e6e232673602b5b0b50abed55996fb0a79cf68e8a9d9d72e0af2b51f2ceab144b09e9fd107a334e7d0aa3192eb41c8f28957f3dc6d5

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.