General
-
Target
RFQ.exe
-
Size
1.5MB
-
Sample
200715-h945v85vla
-
MD5
969a8477f79fde1151cb063057cc0d8b
-
SHA1
9bf8a7944db8aeeaad3fb2066efbd523059ee965
-
SHA256
127d38ba33a67b3fa64e954d209cd9276b5d548462cd47cc3abafa8192073bab
-
SHA512
cc071fef67e27b40c981684284b607aba5db1457ce7f9ae8ba1cc0ce615f8f865a328e64dbb87efb3d40b2308188c47933e0e9214eb6457a434cf149d104456a
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7
Behavioral task
behavioral2
Sample
RFQ.exe
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\E2C1E8F1FA\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
@jaffinmarknma@344
Targets
-
-
Target
RFQ.exe
-
Size
1.5MB
-
MD5
969a8477f79fde1151cb063057cc0d8b
-
SHA1
9bf8a7944db8aeeaad3fb2066efbd523059ee965
-
SHA256
127d38ba33a67b3fa64e954d209cd9276b5d548462cd47cc3abafa8192073bab
-
SHA512
cc071fef67e27b40c981684284b607aba5db1457ce7f9ae8ba1cc0ce615f8f865a328e64dbb87efb3d40b2308188c47933e0e9214eb6457a434cf149d104456a
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-