General
-
Target
a856e5350e746c93706bb1ab5ea9ecf205fa1ac10c4363a248cd8b9ef456e66c
-
Size
844KB
-
Sample
220521-negf2sgffn
-
MD5
6ca3db45bf4a118df5ede9f6cf474733
-
SHA1
c09f78352b5c75babf80eee33b0bb23403ea5da1
-
SHA256
a856e5350e746c93706bb1ab5ea9ecf205fa1ac10c4363a248cd8b9ef456e66c
-
SHA512
4aa0944418972bc11d3c2764ad57e41fa8a18bf6041da3a3fe0b4c98c26d71df88dd85e36b525061bc6bc0e8443a34e6b67e25cf5fd083f2b6d4af698ea4a1bf
Static task
static1
Behavioral task
behavioral1
Sample
Order inquiry skmt042.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Order inquiry skmt042.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\79FE0CC911\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.samlogistics.pk - Port:
587 - Username:
[email protected] - Password:
Seaimport121@
Targets
-
-
Target
Order inquiry skmt042.exe
-
Size
886KB
-
MD5
293669a0b90d7bc20d639c077517ef93
-
SHA1
dbe8051a4f25ee4716297a36295cafb4e46c951c
-
SHA256
f6df04b1b109a5d525073529a3877c3df598f9fcb62278a82412fc7736ed1ba7
-
SHA512
1fbd62362ff5769bb07557a498c85eab818e4916a33aab2cc65dee5566ae3a6bc6b0761e943ea7d2551a70f7609881b8d3c23c1f69a60751ff1c80749079165a
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Modifies visibility of file extensions in Explorer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-