General
-
Target
787b5673df899d1c39ec1a125f163573683ad8496ef64e9947729ab3853028ec
-
Size
568KB
-
Sample
220521-c7jw4afbb9
-
MD5
686a8dbfbf497f4a5fb7b84dab792eb2
-
SHA1
0f0a755d1afd24e6db89d6a674d351e4dab56389
-
SHA256
787b5673df899d1c39ec1a125f163573683ad8496ef64e9947729ab3853028ec
-
SHA512
e60739a56dc7f2d6b2a63093cb650d74c45eaba4423c00f17ccf6d04c24e110b18168a391d780b7361426237f3238b50c4b5b8bd875621b4bbb65d3be009280c
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER INQUIRY.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
NEW ORDER INQUIRY.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\79FE0CC911\Log.txt
masslogger
Targets
-
-
Target
NEW ORDER INQUIRY.exe
-
Size
1.5MB
-
MD5
48051f86729e14fc8787d5895f06d30b
-
SHA1
b2e117d3376c2f7043218ca0932544ba849e006b
-
SHA256
a2bf3f45bdc745f100e74e154249ceccf3339a09de63ebd1118b50ed7a305a9b
-
SHA512
ad91c5ab989716c7a69b3f615fb2fcaa2fabb9ff4932e185db12168ebe67ab9b6ab7ebf11ebf740535382854beadec3749fd86faeedd4f0a9aa3e77b52dc2a75
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-