General
-
Target
64661c33491d2f36f4012a5654e972dd2fe5440d1243a31c331ad37d7b8329d9
-
Size
916KB
-
Sample
220521-ap6a9safa9
-
MD5
5b702333212392f1c272c8c5fb48fc9b
-
SHA1
3d9834a89b60897c231de7135f023bb5d42f9cb3
-
SHA256
64661c33491d2f36f4012a5654e972dd2fe5440d1243a31c331ad37d7b8329d9
-
SHA512
3b5ada42dac1c494239b0967ab4024f35a73f9ece77ee341925ef81446472b2c8a0acaadc05e8decd1dbb8b5d1c85ad096f8c97a01b755b0463ab8bc27283dd3
Static task
static1
Behavioral task
behavioral1
Sample
inquiry specification.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
inquiry specification.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.samlogistics.pk - Port:
587 - Username:
[email protected] - Password:
Seaimport121@
Targets
-
-
Target
inquiry specification.exe
-
Size
1.0MB
-
MD5
96ded925029c99194d0d559c6d7d6923
-
SHA1
807bb539671bf77090cb96000c01248080b467a9
-
SHA256
9a39817abcaf9b2ad45fecd4aec867e6989ece31d2dd41410622af0fc6547444
-
SHA512
6183c4a9540b00d5698bbe6c200aeba8ecf1e53ea17e3c97cd790c143f1cfc8cb27ca50d159f179e85917398d6191c9e3b75b33fb62bc8c90e75dc35e6c48cd5
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Modifies visibility of file extensions in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-