General
-
Target
302afd42a5cbeef7d6709bdd6a82f7ccb04403c06ac99af026909126733d5e90
-
Size
1.3MB
-
Sample
220521-pm114affd7
-
MD5
9bb0e81e2fd49906653b9b696c6c6161
-
SHA1
80a2f1d4a305fcb5312ee742cd847be532948349
-
SHA256
302afd42a5cbeef7d6709bdd6a82f7ccb04403c06ac99af026909126733d5e90
-
SHA512
47282591257e5093c5d46b25691ec7837ee87a310f44fa88ec8c23834893dddaa7448c42fcf8dc065a69d75adb098021468332451787bdc976548171ad6acaf5
Static task
static1
Behavioral task
behavioral1
Sample
IDBI BANK JUNE 2020 Statement.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
IDBI BANK JUNE 2020 Statement.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Dmacdavid
Extracted
C:\Users\Admin\AppData\Local\Temp\781F780B4E\Log.txt
masslogger
Targets
-
-
Target
IDBI BANK JUNE 2020 Statement.exe
-
Size
2.1MB
-
MD5
c94c6c92d872dcccb6b7674ae5edfa4f
-
SHA1
5ae31de995c9057cd455840a0af9c5fadde86063
-
SHA256
cc976126805d59f17a49219bf29d4de6707a8972ef94e04f1f9d0e26746854e7
-
SHA512
c97be462f107cb5ee2bb0d9a00785e459f56baf0c00b31cc01aa2dda22d00223d7cabcf6a07276eed654cb85ffbdf03e7bfb1a4eb09917d40bd331023c500c1b
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-