General
-
Target
226b7b506870441f3a2bfdce077edbbad4334b5bee2e5fffde263078a169f59a
-
Size
601KB
-
Sample
220521-a5p9zsecgp
-
MD5
4169436f6d3ee5739476c9201bb64b7f
-
SHA1
d439932ac331329a6f84202729fb75dc5670f4a4
-
SHA256
226b7b506870441f3a2bfdce077edbbad4334b5bee2e5fffde263078a169f59a
-
SHA512
8991508c5ec9ea269f719b1e9495534a4123bf7ac62e94e7d2cab281bf4e63c68fc4b2679a771a04481afefe8c2717e5ebbbb738295eb0c45a40edc891273a06
Static task
static1
Behavioral task
behavioral1
Sample
New_Order08042020.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
New_Order08042020.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\79FE0CC911\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\79FE0CC911\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\79FE0CC911\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\79FE0CC911\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\79FE0CC911\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\79FE0CC911\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\79FE0CC911\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\79FE0CC911\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\79FE0CC911\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\79FE0CC911\Log.txt
masslogger
Targets
-
-
Target
New_Order08042020.exe
-
Size
865KB
-
MD5
421f7936cf9984792c119c3602f2ac17
-
SHA1
8eca265739fce957205846992fee1abac60b4d56
-
SHA256
878e1a1b65cc05eb728bf4ce85b7ad87576bbc9c8465d1348c71cef4e8c098f2
-
SHA512
eab256280853a804a369acb75d9e43253eea65f2f05d30e098ab8c2fb5f27064977979b4fd0ab0a79119539b1306bb9e0efc6d2561504a01ef6c6227833b2a5e
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-