General
-
Target
73a8cacd0330bf03a7483a32d6a83c99cdc9f762a7ce3bb803690766a40ff0bc
-
Size
792KB
-
Sample
220521-n572pahhak
-
MD5
6459ef20cb64a39bd46f06dcc4fcdd31
-
SHA1
2f518688542f43b3a5b380d94b19bd520ee7d1c3
-
SHA256
73a8cacd0330bf03a7483a32d6a83c99cdc9f762a7ce3bb803690766a40ff0bc
-
SHA512
6f786bcb235658ea975aae4537d770f59cc03254559d5db4f5a5004c667b38a06bafa2dda7393d0b08f81c85fb982d09970ffa8f75e064b80160294c18a4c975
Static task
static1
Behavioral task
behavioral1
Sample
Signed Order.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Signed Order.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\3B8E3C2477\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\Temp\8236ADF044\Log.txt
masslogger
Targets
-
-
Target
Signed Order.exe
-
Size
833KB
-
MD5
ce15880c3f11a7dd4f9d9e1bb8b20e4c
-
SHA1
0a2d2b8b0ca04f361e523272f7ca9cd8810aaf3b
-
SHA256
e34e95979aaed4ee253e5224183636c2da9f5f0ea21e552ba8d9c472c3cb2dac
-
SHA512
93714bfadc8b4fe80092f93d0158ec93cf607d08c6f50695e14974818a4109e66f727e3ba836c28e61e3d3c90f3dd7842f009db0d5b975247fcecb3eb784865d
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-