General
-
Target
d689a361064790952175d8e479af5bccfe980c8a6875c4ed1114eb97366f9644
-
Size
735KB
-
Sample
220520-3qqanahch9
-
MD5
02495a642b79fc0521531571cd014850
-
SHA1
be8e23900858a4b28da4ed9693d389f290d8b5c2
-
SHA256
d689a361064790952175d8e479af5bccfe980c8a6875c4ed1114eb97366f9644
-
SHA512
56224f4389274cdaa46f64296cfd80eb7c168a416d3f3a6e1bc9e0e2bb84a368c81de86c499b480f710040fd60444500ee54f1c8b291110ec3618cdc46a4990e
Static task
static1
Behavioral task
behavioral1
Sample
Revised Invoice Climax .exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Revised Invoice Climax .exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\3B8E3C2477\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
71c7eb1f8baa88
Extracted
C:\Users\Admin\AppData\Local\0F48153F20\Log.txt
masslogger
Targets
-
-
Target
Revised Invoice Climax .exe
-
Size
850KB
-
MD5
a8ed22767227400f4fb7bf2a19b2baea
-
SHA1
1621e5246a62157f1ce424c0009e5e4c8bf367d2
-
SHA256
9438029220db8ca0eceabb6d576917ebce7b30db2eb9ca8e52a85b089c040a9b
-
SHA512
2e0e5aa6a01f2e04d0ea1938ed5313c4c400a24944f006e8aaa5f90b41cc80499de0aaa1329ca1eaddbc11f413fc0d3e0da8c52a99736c017ae48ba86dad1fac
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-