General
-
Target
05b37fed91a4de9d7442349ccd379719c3b9dd9b220d28b702adfb25f05d010c
-
Size
904KB
-
Sample
220520-p9kmmacge9
-
MD5
443e88cebec0121202f20edf999ef955
-
SHA1
01a386556ad98eff5ed212fae02f7d3cdf601113
-
SHA256
05b37fed91a4de9d7442349ccd379719c3b9dd9b220d28b702adfb25f05d010c
-
SHA512
cd4fb0c56a8dbb78b451d513d0f96234328c4c5dacd1e8379a91b99d4c33454f487b3826ebabed312761ed7af2dfbc40b3baa3f7c9abdf3c6dadfb91f88defbc
Static task
static1
Behavioral task
behavioral1
Sample
scan00465.pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
scan00465.pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\8506BBE7FF\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.saritatravels.com - Port:
587 - Username:
[email protected] - Password:
sumits%$321
Targets
-
-
Target
scan00465.pdf.exe
-
Size
1.1MB
-
MD5
6518afc08223493b4e6303248a6c70d0
-
SHA1
e0b419b7f13e1271f32b46551febed8d5168f328
-
SHA256
f98d355a4771e886220488b0bffa005af9769480cde5aad275d4166c2f9b2e48
-
SHA512
85a3956cccf90116220b6cd6bc63898806bc703589d5e5d7ccc4bfc13a0908ea3538d4b5dbc7af075e11c016f18029e11a7c510ed1af393f4e1ef9244cc71813
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-