General
-
Target
370da6a864cc0f7c3387cee818401ef3892bd81b153a9fe39cc6affc55d248e8
-
Size
836KB
-
Sample
220520-2kscdsfec5
-
MD5
759e64330ef03e904c62c30dcc5ae26e
-
SHA1
9f9b0b7e192995577b72aa31561d77d507767f40
-
SHA256
370da6a864cc0f7c3387cee818401ef3892bd81b153a9fe39cc6affc55d248e8
-
SHA512
a4b7d551d1c2dd5b5cd876025e8c90a2585cad1692989e680e2b71601af14cd884f1a1fc913a4f900c2ce731f048b9aeb23a7f3b595292b2f82e8f3622bdf33e
Static task
static1
Behavioral task
behavioral1
Sample
INQ4556 PO.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
INQ4556 PO.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\AEF946DCB4\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
masslog1960
Targets
-
-
Target
INQ4556 PO.exe
-
Size
953KB
-
MD5
787505a211af41260aa84e8473ca533e
-
SHA1
303bb329745f99bf3c88535914f8b0ac768ac107
-
SHA256
925bc865f2151bd08bb14123ebf68f97eba97529a33de123e4e4cbade9a951e6
-
SHA512
bfdf5ef6801412652ba9da5c2271317cfa8a153171bf7c3c2648170c4f2f0362fafe0697290a99534c27a977df55882462ae5ee3e03351f844c3b6d21b7ad78b
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-