General
-
Target
8d0d6ef5d40f5086af207d94212c1f8cc737f34eab3b84b8f14ff5a4a50b831b
-
Size
776KB
-
Sample
220520-2dgmbaaccp
-
MD5
60b25cd89c24b3fda7c83e1958eea943
-
SHA1
464ac8254a7a5a201efabf87ff9a59453743123a
-
SHA256
8d0d6ef5d40f5086af207d94212c1f8cc737f34eab3b84b8f14ff5a4a50b831b
-
SHA512
54ca5959121e404ed7d95d1634a082a9501af5887662e2ead2faffb9ac245eeb8990dd03f1f4721ab3fdbf757e1ee8a9197e0871f244d945d2543417eba4705d
Static task
static1
Behavioral task
behavioral1
Sample
scan copy.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
scan copy.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\AEF946DCB4\Log.txt
masslogger
Targets
-
-
Target
scan copy.exe
-
Size
859KB
-
MD5
54a3dd33e8b12aed84551a0fecaa4068
-
SHA1
637e1d8791e758bcce7a77c18c3c2019105e70e1
-
SHA256
fa1dd731e06f5a7470f45a3f09f0b39d2e236d022c9a9d6e52828e8214c5893e
-
SHA512
ed3a361816805a4894eee14de6d9a32d4bc55e1ca8daac9fbb358f6881acbf590bb23b3cfeb8ef16625440bd13e69bad34d8de51a5599f407b94249752268418
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-