General
-
Target
Purchase Order-7-15-2020.exe
-
Size
952KB
-
Sample
200715-tq8t4fx4he
-
MD5
c6b0da8a4b100bee3958498acdbcf97d
-
SHA1
1bb228742a3a201edafbfbaa12f796f3a460a1c0
-
SHA256
e745073f173f603b6200a9fc9e6975ee72a9c3395c1868471056e651ae1470e5
-
SHA512
da382870c1eecabe4c6abc1ea4374cea481f9bd511cd6ac4cd4d77b5a71f8cdb0eef4fab488cfdf0bcca5a707e8ae2aa83f5540748bdc0b832c9426abb4f6207
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order-7-15-2020.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
Purchase Order-7-15-2020.exe
Resource
win10
Malware Config
Extracted
C:\Users\Admin\AppData\Local\C8A579F880\Log.txt
masslogger
Targets
-
-
Target
Purchase Order-7-15-2020.exe
-
Size
952KB
-
MD5
c6b0da8a4b100bee3958498acdbcf97d
-
SHA1
1bb228742a3a201edafbfbaa12f796f3a460a1c0
-
SHA256
e745073f173f603b6200a9fc9e6975ee72a9c3395c1868471056e651ae1470e5
-
SHA512
da382870c1eecabe4c6abc1ea4374cea481f9bd511cd6ac4cd4d77b5a71f8cdb0eef4fab488cfdf0bcca5a707e8ae2aa83f5540748bdc0b832c9426abb4f6207
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-