General
-
Target
12b5b8adeb972d937a1e442c0c19059a5f2ef1f5785122c905242544b7dfab6c
-
Size
1.0MB
-
Sample
220521-pb32baabhk
-
MD5
66557e58ea2f1c64c93e13830c52bbc8
-
SHA1
6f5978f999631e72da95f62a4bb9c72bb2b7acc7
-
SHA256
12b5b8adeb972d937a1e442c0c19059a5f2ef1f5785122c905242544b7dfab6c
-
SHA512
0606f65e9cbdfdab88d9ec868ba09a9a13e329a2d7ed137fc43c0de8d7ac37962b173449b582238dac8ba89d788afdd7029c4ab9b9c710f5558aecd5692c18dc
Static task
static1
Behavioral task
behavioral1
Sample
CONTRACT PO CONFIRMATION!.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
CONTRACT PO CONFIRMATION!.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\8506BBE7FF\Log.txt
masslogger
Targets
-
-
Target
CONTRACT PO CONFIRMATION!.exe
-
Size
1.1MB
-
MD5
bacf582001e91e3393c2aef245ace9a0
-
SHA1
c53e68fe71b695e2c7fb6c05aedb422bf5856f7b
-
SHA256
4474bd1e6a8472755ccac7d31beeefa7575b8b89610b71d1d08cf95a0ca17358
-
SHA512
0f7f7117b8551f1f91da85bc933185b1f3729bca987471ef29ba779e328eefbc9d1d6e0cdc3183cbac674800d32eb2f3eccdc2ae28561d57bce3731b910b99cc
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-