General
-
Target
e5c28e3ac87bbb2024004844926484647f017dc5c506405873539b59ad0a64a4
-
Size
652KB
-
Sample
220521-d7112shaa2
-
MD5
1b30b6afdf156a4ee5857c56064436c8
-
SHA1
02fded2b6111d580eea704b38ba72fbc9b00c592
-
SHA256
e5c28e3ac87bbb2024004844926484647f017dc5c506405873539b59ad0a64a4
-
SHA512
26a9c67764aad38dc6f239d913ad3d21e3f790c3030fa193d28772061d78f7e7cca3c5b6beac6d9f8b8624c41992f59eca3b3238171eaa9434276eacb6a67373
Static task
static1
Behavioral task
behavioral1
Sample
PI List-pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PI List-pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\3B8E3C2477\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\0F48153F20\Log.txt
masslogger
Targets
-
-
Target
PI List-pdf.exe
-
Size
742KB
-
MD5
f44eb63e27a1ecc5a17a22712898c003
-
SHA1
65e320e9a7a9c72c98d3de771899fc45bc99388a
-
SHA256
2485826ad6e01c5ae26b460a9152854b3a6780da46f4abbca35be5b0bd570eb3
-
SHA512
a6355fe3a7c76c0dd504170afc68e5251b5488dfd32c893c7ae4a25657d61812bb5d6351d002565626a8d3245483559abff31e704cd69cfbbfdf5090d591d6a6
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-