General
-
Target
68cfc485479b0e8c9d632ea389f3614e1c2ebd11fc79cc3075eaf005e361a155
-
Size
915KB
-
Sample
220521-apcnysaeg7
-
MD5
2abc5935096092a39ec4a696b39d9bb7
-
SHA1
12e3c83d0caf75a6221c9187cff8c3f44ba32b51
-
SHA256
68cfc485479b0e8c9d632ea389f3614e1c2ebd11fc79cc3075eaf005e361a155
-
SHA512
7f32125fbc92a347bf8a486679631a7336a77607588e4629e8c8b872f8513d5a3264ce6e4e82735a407371b3301b9c7849b39ba3ec43533d79ed790f6a3bb3af
Static task
static1
Behavioral task
behavioral1
Sample
inquiry specification.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
inquiry specification.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\79FE0CC911\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.samlogistics.pk - Port:
587 - Username:
[email protected] - Password:
Seaimport121@
Targets
-
-
Target
inquiry specification.exe
-
Size
1.1MB
-
MD5
16c4321bc234cdab8a4d88ab7ec34dce
-
SHA1
5d14eca7122d63f168dda48f6d93cdc74493d265
-
SHA256
18e55619cb6c0b70275af3562d71f362114ac432ec97fbcd4ad8425113f6471a
-
SHA512
d3d5277cdcca9c99a3a797bb0bbf68f2fcdf41efef540e5c445006ec2893bd6c240e620efd78ebe559f608d6423e03d57e161ca03da5e618f4a95a288e368c2a
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Modifies visibility of file extensions in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-