General
-
Target
0c71a1d8fb917a29dcb4858fd3654c727c14b721ab1dc4986e7a2ad0d55ea077
-
Size
886KB
-
Sample
220520-3fmf1sggg9
-
MD5
f0eb9ba368987de2d973d1a75eda9b3c
-
SHA1
e95e504ea5a419a600498cc3806a8d92df44f950
-
SHA256
0c71a1d8fb917a29dcb4858fd3654c727c14b721ab1dc4986e7a2ad0d55ea077
-
SHA512
5cdee3016fd25c34ae170acf97f840e06d2fcbc050382372a99698bf60aae39520217947cb4a538bb6e3162ceed338186f232ba3598e440f7507c3c2f8e48ba1
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order_12082020_10002993884.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Purchase Order_12082020_10002993884.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\79FE0CC911\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.samlogistics.pk - Port:
587 - Username:
[email protected] - Password:
Hamzaa2121!
Targets
-
-
Target
Purchase Order_12082020_10002993884.exe
-
Size
1.1MB
-
MD5
099b147450ba62294345230e057e492c
-
SHA1
3f5dd2f621cc9f850b01c0193a9c95fb21b1f4b7
-
SHA256
271ae8f2104165d934488b9888b1fdcf6d6ec9a2263a603270ac9098f5d27323
-
SHA512
a0bd10ccaf6cd9ef6a83db34f4c0bf6c0f9c3750b5ee14116465ea7042c7babe585d126d80a0d82960e9d31b06b418e6a8011871e5a67994fb7f45c78a1e5c9d
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-