General
-
Target
07260bae8062330a1a42e28f0791ef86676000dbc4499d657ba91a662829cce4
-
Size
837KB
-
Sample
220521-d4gg8sbgfp
-
MD5
8e54371b1e0678df3c185c9197a2aaa6
-
SHA1
ce439cc106c5deae5de3ebc4a89eb1f1c9c60ee9
-
SHA256
07260bae8062330a1a42e28f0791ef86676000dbc4499d657ba91a662829cce4
-
SHA512
83ef1330ffbf58a173bd35f88c40be534a1d0e94f092649144a9e366dafbda971ad137b339909923f8cd8e734b67f27f691fa36a074167f0d8a192829e87b995
Static task
static1
Behavioral task
behavioral1
Sample
PO ORDER.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PO ORDER.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\3B8E3C2477\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.porathacorp.com - Port:
587 - Username:
[email protected] - Password:
susila@22
Targets
-
-
Target
PO ORDER.exe
-
Size
910KB
-
MD5
a2c75cedd6deb53d4ca5508e87e15eed
-
SHA1
d40bcc45c638bef0f43dd8e33971a4f90956b6f9
-
SHA256
ed23e691927f32d5c2d18f5b763fcc71fa62c6150233b1dbcf967d13521ef8f6
-
SHA512
6f6bca0c8bf45e48ea853a1285ffa927efdcbf8c8ad7158e3e161c7d291997abaca1fe5fc987822051786f19c066a13d2630e3ae4716baa8fd69e5690063efa3
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-