General
-
Target
2909694b162fb67f8b7d6f01bdb086d23216280a1f84565a13a4406ac46147c3
-
Size
673KB
-
Sample
220520-2zx67abcdq
-
MD5
2fb78b099edc88207a4dbcfa8b6a44e0
-
SHA1
4c7a556c5d7373bee762c51c716a548d6f6a4974
-
SHA256
2909694b162fb67f8b7d6f01bdb086d23216280a1f84565a13a4406ac46147c3
-
SHA512
01569acb98ebf4aa45b8a79362501d1d6fcb4b7baf29b4b9e9eed1166228b73cc68ffadc83730f2921d836153141eddc9ff8c04d9152512c0943eeca5d68488c
Static task
static1
Behavioral task
behavioral1
Sample
doc000643665764.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
doc000643665764.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\Temp\F293CD6622\Log.txt
masslogger
Targets
-
-
Target
doc000643665764.exe
-
Size
1.4MB
-
MD5
e04ea3820e1699eb0cce1ddb55b91327
-
SHA1
736ab206d9bba71557069b42b05b7615b28e5b0f
-
SHA256
367c31b38577406fec107ed639cc6503710de53d8326b92504fd3919105ffce9
-
SHA512
64926a6671e9b90a69ffb64f61ae48d59fc61834a5083ae1ad119af711ef04923dfc607ace4bdd4ab2c06e495ee1b84f0399dc0df54b847d201d6770c864167c
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-