General
-
Target
49b64249d56b43b7e92112ebde5e20d9ae67cd88a2fa1d856eed251fc328cefb
-
Size
834KB
-
Sample
220520-p9k86acgf3
-
MD5
51b9fb543c228ac2d6c0d75a0d5d6500
-
SHA1
85315d930b2424b4a21dd437f7cc625dd599c86d
-
SHA256
49b64249d56b43b7e92112ebde5e20d9ae67cd88a2fa1d856eed251fc328cefb
-
SHA512
24a989d7488d11f2ce58b395891e3a4f69d75c1a6f41e2d967a87b05e103a09d9e60364b9a3737e9817646b67a50dde2a50fe821db95aa4e107d4faf3c8f133b
Static task
static1
Behavioral task
behavioral1
Sample
49b64249d56b43b7e92112ebde5e20d9ae67cd88a2fa1d856eed251fc328cefb.zip
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
49b64249d56b43b7e92112ebde5e20d9ae67cd88a2fa1d856eed251fc328cefb.zip
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
DESIGNS ARTWORK FOR ORDER.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
DESIGNS ARTWORK FOR ORDER.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\3B8E3C2477\Log.txt
masslogger
Targets
-
-
Target
49b64249d56b43b7e92112ebde5e20d9ae67cd88a2fa1d856eed251fc328cefb
-
Size
834KB
-
MD5
51b9fb543c228ac2d6c0d75a0d5d6500
-
SHA1
85315d930b2424b4a21dd437f7cc625dd599c86d
-
SHA256
49b64249d56b43b7e92112ebde5e20d9ae67cd88a2fa1d856eed251fc328cefb
-
SHA512
24a989d7488d11f2ce58b395891e3a4f69d75c1a6f41e2d967a87b05e103a09d9e60364b9a3737e9817646b67a50dde2a50fe821db95aa4e107d4faf3c8f133b
Score1/10 -
-
-
Target
DESIGNS ARTWORK FOR ORDER.exe
-
Size
867KB
-
MD5
73b302dc6804f0099e0957150f7a5782
-
SHA1
c6cc6631668f0f8132651bd01dd4ca0303dd5fb1
-
SHA256
0b59a5ffd1da84a9bf88fc0c49d758fb8288f1e9564111ec5c4f8e0ffa91940d
-
SHA512
81f8751498372369f7dcdeb8a16a8d4a3460dfe64a59e1ec703a1f2a71e53d322ecd32b7a47039ee03f0628132b164806aef522a2ddd97013b41e2c32a3b61d3
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-