General
-
Target
f1e4fd001ddab683c7aa0e2b032e32c880fc74217d28a8f05888b9c56cf01e06
-
Size
803KB
-
Sample
220521-capfbagehl
-
MD5
4bd4c303e2e3f0f62ec210c3e525c0c1
-
SHA1
126703fc06fa113a28ad62f90bb3566f4755be30
-
SHA256
f1e4fd001ddab683c7aa0e2b032e32c880fc74217d28a8f05888b9c56cf01e06
-
SHA512
59221730e77663ecc7b95631e1446a9f5694082563c800d9fe076564999c17d744067012fe8fcf653a99d61d14e22f3e20ebe4eeb9afd4ac53985a02efe23383
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
QUOTATION.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
biggod1234@
Extracted
C:\Users\Admin\AppData\Local\Temp\781F780B4E\Log.txt
masslogger
Targets
-
-
Target
QUOTATION.exe
-
Size
864KB
-
MD5
c2b1fcf142b7b221817ace1073ba58ae
-
SHA1
e8952c01300ae5a7ca6cc2e24807a6c12aa556ce
-
SHA256
6d23e4cb2a7704f3ebeaf44893bb9c1df101f0f03d522ceb51a0e1cfc7f8e8ec
-
SHA512
6c82b754c8e4c2df128f5f562867d59cfabe1feb24a8adc2ec1db3a6c545ed59de18f8804689bf0ef4f81abf3e169ac937fdaaf66b2daaaa32d96772cd5ec3b9
-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
CoreCCC Packer
Detects CoreCCC packer used to load .NET malware.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-