General
-
Target
326ef47a0b8780b2230e196d5a75d074ded67fa08d104ec0346987ae6ac99663
-
Size
968KB
-
Sample
220521-a2hqqsebdl
-
MD5
9979ad15a1e13b0b8ca7e788b21886fb
-
SHA1
cf642e923128048f6b33c110f224e3fdee07bdde
-
SHA256
326ef47a0b8780b2230e196d5a75d074ded67fa08d104ec0346987ae6ac99663
-
SHA512
e698ac8fbffcf88db17bee093c5d9eabf9177d72d0fd941f8d992873e224f6b26336776bce4287e9513ac7f2aa55c1a8456310cc1ded27c31936f6aa5a8c69ad
Static task
static1
Behavioral task
behavioral1
Sample
AMG-017-PR-2020.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
AMG-017-PR-2020.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\8506BBE7FF\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
y8wG[wgBvT]F
Extracted
C:\Users\Admin\AppData\Local\Temp\0F48153F20\Log.txt
masslogger
Targets
-
-
Target
AMG-017-PR-2020.exe
-
Size
907KB
-
MD5
6f5190a7c7a0a14b5af3ffe16b93bb37
-
SHA1
b81f28c015a1469657126c01e802d33b8d63e4f9
-
SHA256
e96e191e65ba59a45f7b491b23588a0d6ed50d5ada789b54a6e531dcddbb1221
-
SHA512
9631a3909bdc7c19eafc5327f5e9374a55603235b8312275d81ce634face70014824efefe0ab55bf2acfd46668f6f554ad9957eb1d79a081c3581700cfe1a3a5
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-