General
-
Target
f9bebc15ea243aab82c91f22098a4dd0c50404346e5c0c2c4f507e4b1223d9ba
-
Size
683KB
-
Sample
220503-zeg85acba4
-
MD5
5cbfddc1c8d0445501a44500dd99d326
-
SHA1
9b0190ed95bb6070f96c2d4e6d8f43209e68ace9
-
SHA256
f9bebc15ea243aab82c91f22098a4dd0c50404346e5c0c2c4f507e4b1223d9ba
-
SHA512
a8942124c1a954c5bc1e8e5100bff5a3c1f8466bac996fe69fdc7ba5a054ee21fab815e3d921ed77e33fa9640b5f5cc2317c83d07b085f3a8fa3b675c5cc0b98
Static task
static1
Behavioral task
behavioral1
Sample
payment swift.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
payment swift.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
payment swift.exe
-
Size
929KB
-
MD5
c4cf28c1d5e4da94c3391b90cd91671d
-
SHA1
2c0db45e4852ab67255f78fe6921ada7a305244e
-
SHA256
433c68e89fe741e7ec59e064861baf726ab0b8637849d9d92fa5e3a2819d211c
-
SHA512
23590c2584a04127ec7c75f5f642a6884715390158b897e3617d4cbd536d6369388a0f3cce6d926ae7bf3e149d4cc8c99f82a35e340553421411d1c624506f39
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
Modifies WinLogon for persistence
-
Turns off Windows Defender SpyNet reporting
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-