General
-
Target
d691b9659a18c0d257cf10a825f68e95efd3817177453a20ea757005d2b035c0
-
Size
1.9MB
-
Sample
220521-cg3xaadhc9
-
MD5
9e3cbd6324436a97e1af52cc7674d63a
-
SHA1
8303bd2214edc5fc7a4df10f8789f29eedee2aa8
-
SHA256
d691b9659a18c0d257cf10a825f68e95efd3817177453a20ea757005d2b035c0
-
SHA512
370533706d48bc8d9791553196f65712c8944bb925eb47fea4703e5300c71b187495bc213362cafd8e7d685a6f568d847a6f7d1c13931a0b69f78275106153af
Static task
static1
Behavioral task
behavioral1
Sample
PO__2008.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PO__2008.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\3B8E3C2477\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\Temp\2EF8342664\Log.txt
masslogger
Targets
-
-
Target
PO__2008.EXE
-
Size
1.3MB
-
MD5
7f1adfbd690c3493f9853c60611a6d26
-
SHA1
4b8abeab03f5508aee739f4c9c8b7180cb51204c
-
SHA256
aeaadb0810739b7ac17ae1ca594a750c9e831a3407da2f845dace782ce930bbb
-
SHA512
d920aaccfc720d82a0fedb2ad362eb7dbf67b686835be91e159c1ce42e5c0bcb9308f2b963d2aac59da87163d173e8aedf55d2c16799b3c8646212acb8249aef
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-