General
-
Target
79690d4fb9d6c28644bb6ffaf431fb985b626ab681c857397e54c05ff221b46d
-
Size
795KB
-
Sample
220521-c7anesfbb2
-
MD5
82893a5afec0b0ebb54baf8f41e84985
-
SHA1
98d78010863348bfb9a0bf488cc3f4c77d28257e
-
SHA256
79690d4fb9d6c28644bb6ffaf431fb985b626ab681c857397e54c05ff221b46d
-
SHA512
588e223005b7a134bbb8575a0c68c81a193c56121eedcadd9bdcf36a9e82bea351b8dd043b8d49700529692633fef3cb29b5ddc9a5d401b0df3bf56374d70097
Static task
static1
Behavioral task
behavioral1
Sample
[C38226] #TD JMMasuda_Mfg.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
[C38226] #TD JMMasuda_Mfg.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\Temp\F293CD6622\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
Amfl6kh#?~N0
Targets
-
-
Target
[C38226] #TD JMMasuda_Mfg.exe
-
Size
817KB
-
MD5
6ca7ca71e6777e838bb32c911e5e68eb
-
SHA1
a3c11cc089fd8f5db0d673d9f4f63d495ee3cffe
-
SHA256
fbc70395ea55477b8827145c12f85133565b1be20e31f71327ea17d2706127be
-
SHA512
c772675fe56dc2d95bdf7ff59c0a0ea81f0743f074cb5c7e9c29fc78e8f9eb19eb023d9b0a2bf2f9aadef2250dba78667a454db46275c7a9a91a800180ccef58
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-