General
-
Target
kVqQhg9evpzeNYL.exe
-
Size
1.0MB
-
Sample
201205-hgx7km4wl2
-
MD5
8f1f7c7eff3d69a1be1a816cb3609840
-
SHA1
b79a7bd962941a0430f01870be4ce73188f611ff
-
SHA256
41e5f5f33f0bd2be4a1a518796838feae0a966320522f07dc04460c6a386dedc
-
SHA512
1e041db3af0f069e837a2d72c4749d0fb95448413dd43feeed55f7d682d6c9fca61cc0066ddd87912c2504d3f0bbac48bc7a540e93533ddc51942396368eb05c
Static task
static1
Behavioral task
behavioral1
Sample
kVqQhg9evpzeNYL.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
kVqQhg9evpzeNYL.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
kVqQhg9evpzeNYL.exe
-
Size
1.0MB
-
MD5
8f1f7c7eff3d69a1be1a816cb3609840
-
SHA1
b79a7bd962941a0430f01870be4ce73188f611ff
-
SHA256
41e5f5f33f0bd2be4a1a518796838feae0a966320522f07dc04460c6a386dedc
-
SHA512
1e041db3af0f069e837a2d72c4749d0fb95448413dd43feeed55f7d682d6c9fca61cc0066ddd87912c2504d3f0bbac48bc7a540e93533ddc51942396368eb05c
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-