General
-
Target
Facturas y extracto bancario.exe
-
Size
1.1MB
-
Sample
200708-d1dvn7dvpx
-
MD5
680abdbc32da4b031df7d510393bd60c
-
SHA1
aba459e8efa99baa8c90b6dd2e596bb892915749
-
SHA256
7b45908d8c0f59d45c8c4186ae1713289e813c6c0cd3e53184e61f576da936a4
-
SHA512
a405a7f1d40318fc8a2d7dfe66873f71d3372f5bfaba17e98334d3bfe4223f45edb876072b3f11b61a573f956a5ffb7347ae81c89802a04c81353c82cfda4096
Static task
static1
Behavioral task
behavioral1
Sample
Facturas y extracto bancario.exe
Resource
win7
Behavioral task
behavioral2
Sample
Facturas y extracto bancario.exe
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\E2C1E8F1FA\Log.txt
masslogger
Targets
-
-
Target
Facturas y extracto bancario.exe
-
Size
1.1MB
-
MD5
680abdbc32da4b031df7d510393bd60c
-
SHA1
aba459e8efa99baa8c90b6dd2e596bb892915749
-
SHA256
7b45908d8c0f59d45c8c4186ae1713289e813c6c0cd3e53184e61f576da936a4
-
SHA512
a405a7f1d40318fc8a2d7dfe66873f71d3372f5bfaba17e98334d3bfe4223f45edb876072b3f11b61a573f956a5ffb7347ae81c89802a04c81353c82cfda4096
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
UPX packed file
Detects executables packed with UPX/modified UPX open source packer.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-