General
-
Target
f68c119b9e5b1365aa6f9b333e5222f7d35c6a67c3ac6a2f0fea4a7e5d04c726
-
Size
794KB
-
Sample
220521-bzvsysfghq
-
MD5
bca62c44f7880c139eaf0813569ecab2
-
SHA1
18751a62e514849a04e9f3c145aa95a3b887009e
-
SHA256
f68c119b9e5b1365aa6f9b333e5222f7d35c6a67c3ac6a2f0fea4a7e5d04c726
-
SHA512
4f3e9c821099f46ca2ec647cbedc6be724d1e6f46980cf89e2e4ca9713032b8fcd963325f80cafa6640001bd9223276d56adc3a9516053301d0aa3ebd7ae2bad
Static task
static1
Behavioral task
behavioral1
Sample
DHL Document.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
DHL Document.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
1234567890
Targets
-
-
Target
DHL Document.exe
-
Size
877KB
-
MD5
8667413de7acc939e5157862390e49ca
-
SHA1
e09365296e8bcb1d1842032d3e31d2b6e880a75e
-
SHA256
d2aba15a355f2587296a0d3de5416fe3ad7a644aaf39e9b8c5be0125a346abc6
-
SHA512
0e64a10bd8925cc5f4be46c2d9ee4f0d5dac8e482ff86b5658d198ed7b30732e138e2b48e5a136d6269b8ee4c357e6454b31d184402c0477ac2985180c02ba3a
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-