General
-
Target
81ab4f76e1157ed9509e7615027baaa74070704be460d093b4f193ad976f683a
-
Size
791KB
-
Sample
220521-c4w29afaa8
-
MD5
e165032e0c340c98d823d7d40c154aac
-
SHA1
0b58808d2c5fc659ae4512ff3aef896d82476f86
-
SHA256
81ab4f76e1157ed9509e7615027baaa74070704be460d093b4f193ad976f683a
-
SHA512
d6cbfecaef1984c7f0b19978dcbd72ab862ecbbb531e43e5552d2c0a341076d1d342813ce4c2962497ae4b40e3f2e031b09e2ad2f4e82c9d1e3530b2094e7565
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry For Order Confirmation.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Inquiry For Order Confirmation.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
1234567890
Extracted
C:\Users\Admin\AppData\Local\Temp\F293CD6622\Log.txt
masslogger
Targets
-
-
Target
Inquiry For Order Confirmation.exe
-
Size
852KB
-
MD5
ca3d1f78f33139c641cc120f2308e5e8
-
SHA1
71df8438202c96de30505abde4674ef9502f7fe6
-
SHA256
1793f187d699d6b5eac0451dc8740943f1622a4ce989e7d8d03fef4976564b1b
-
SHA512
0d30db1915b7e45c920220e83ea7df31cd7aaaf88baa86b72e6fa306dbe409a6fe8a6fcd2ab0863e599222af88c2a86c3fc4574df96ae6c5642ee31fff9958a2
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
CoreCCC Packer
Detects CoreCCC packer used to load .NET malware.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-