General
-
Target
7e8874cfbd36629e9bec7aeb253821f511e3a1296e8da614eeb96642d7257a65
-
Size
1.7MB
-
Sample
220520-2qjbnsfge8
-
MD5
dedbeb432576c3a6d930b00e30ea624f
-
SHA1
669e768a50bff972a5a5dabb34a5e6b393d49e7c
-
SHA256
7e8874cfbd36629e9bec7aeb253821f511e3a1296e8da614eeb96642d7257a65
-
SHA512
2662dfeb7663b62dfcda2a46fbd012b486b59a8def6d39dc7443891a3ee96a960155b77ddc7e955868d49fd85d49eee2f964fc3d4c5b1ac34d074a6ee51d8267
Static task
static1
Behavioral task
behavioral1
Sample
TILOCRYP.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
TILOCRYP.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
TILOCRYP.EXE
-
Size
1.1MB
-
MD5
204bdadf1189b3224b4ddc9317ae1559
-
SHA1
27eafcc0591dc3742718a24f59aacd80a7dd3b47
-
SHA256
3f83c090819bc1dd8a9c1db3588b51ecd839bf0ca85a21f552c4346abe09efdc
-
SHA512
b73ebdc5a67acfa1b78ca1a18c2b74806034ac00e5d8eb6f35bb24e5e4106ee575886d70382c68be84f3b5f975a6a1b66a3a37c09a3492073bd318c99fbcca61
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-