General
-
Target
973e9c558b26e4bb676d335b553923fea026b9af1e2f7ac28a304c6c5a8c1857
-
Size
883KB
-
Sample
220521-adk6yschfl
-
MD5
890a9fdee6636c8c002350a562233789
-
SHA1
d784154b70b352a9706a7a881cc595475d07e127
-
SHA256
973e9c558b26e4bb676d335b553923fea026b9af1e2f7ac28a304c6c5a8c1857
-
SHA512
2c806bf43b67f6cbb5b8183d025fb3d23fc6a61f536b6ac94ead4fee844dbfe580752330f442f84483d1f899c6c89085246312629f71682cc8e4d6b9cd1be81c
Static task
static1
Behavioral task
behavioral1
Sample
NEWSC9 28TH PO.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
NEWSC9 28TH PO.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\3B8E3C2477\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\8236ADF044\Log.txt
masslogger
Targets
-
-
Target
NEWSC9 28TH PO.exe
-
Size
1020KB
-
MD5
b543a797b74341bf5d8f52b04e7a3141
-
SHA1
d2b67094fc02aa9f70c7e6c015be86797e38d5f0
-
SHA256
2467434b0ac840b5f4dfa8ac3bc14ac9ee6004e7b71bfd3303ab62b6345f0c62
-
SHA512
74dcf634733c2841715e094868e1b651faf962e242591dc35a6a60428d12c2931a93ce82ac4c556158850ce22dd117bddf6f53f46487ad442359535453448bcd
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-