General
-
Target
4d202d4afe38b078d7aea0d9c1a89e2f0ec027e1555ce35328a293dcaef8bb25
-
Size
885KB
-
Sample
220521-n8gznsegf6
-
MD5
988c76a8ba32622ea114119c21c6b8f9
-
SHA1
8b2f22ab2bbb55c78243ecdd0e2aa465fd60d144
-
SHA256
4d202d4afe38b078d7aea0d9c1a89e2f0ec027e1555ce35328a293dcaef8bb25
-
SHA512
2fb532117a0f855ff1df537a16f781d38bdfbfcc14c61c63ce738ea0d651a1d72f44460174425199d7d50c262816f94418432c6372d8e04178ede8aca5fb399c
Static task
static1
Behavioral task
behavioral1
Sample
T.HALK BANKASI A.?. 25.06.2020 Hesap Ekstresi.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
T.HALK BANKASI A.?. 25.06.2020 Hesap Ekstresi.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\79FE0CC911\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\Temp\EEB932C954\Log.txt
masslogger
Targets
-
-
Target
T.HALK BANKASI A.?. 25.06.2020 Hesap Ekstresi.exe
-
Size
975KB
-
MD5
c9a52acd2cb5a21a32cdeee85201d66d
-
SHA1
5be53cb72024fac27e027857c09ad79c4a7124a0
-
SHA256
c60b9f94ebece1e217b2724d77bd929dd208466813954315cb588887c6a21480
-
SHA512
233ca6cdf1a4cf2a74a9a4c6496859bbcb8ed957a0fa2c99107f3a4cd775fffa2ab429c85d79cc66176a99014865b672faeb6273ffcdf52cdf46f47a14553224
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-