General
-
Target
7b7ea0fc09d3630a2909440b58cf3863fbdeb9c2140a396ce2ea43a658f6395e
-
Size
1.2MB
-
Sample
220520-2ekqcsacgn
-
MD5
9f6d995c7c0008773041666781475177
-
SHA1
0dabef726b2c85431073761d1ed61e6aa1015f5f
-
SHA256
7b7ea0fc09d3630a2909440b58cf3863fbdeb9c2140a396ce2ea43a658f6395e
-
SHA512
84bbdde2d6799c7a93e288d9a9b7881678020fd1e9bf98dea5e114671493b530fa160485a5a6d26990228804be2fe1afe5bba1d22a19ebdcea8232111155b863
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PROFORMA.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\79FE0CC911\Log.txt
masslogger
Targets
-
-
Target
PROFORMA.EXE
-
Size
625KB
-
MD5
5ee37bae7dc2ef6749894b360079de60
-
SHA1
2c8da401b48e11100319f358063798126013dd35
-
SHA256
afa30484561c8bfbba6a3b13b19ead18aa40492c52ac6501a18fed59c6a11a3e
-
SHA512
2a1bbe00cb3faa559310f302d24bc4c73babd58702ed6ae5146c40af8c00386d26f81e83ee891e1cab2853b1d5f0eb0668570999e29cbadf263cb842d8af6beb
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Modifies visibility of file extensions in Explorer
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-