General
-
Target
005e04a19875e8e122c919a7e8ef88b2d15efff1eadb8a30c4096e9194d52494
-
Size
1015KB
-
Sample
220521-pp92safge5
-
MD5
e9c9f0069ccb2268778de10e993aaeea
-
SHA1
42f68d5e83f5c9af998d404bdecd77e9f3e8f93b
-
SHA256
005e04a19875e8e122c919a7e8ef88b2d15efff1eadb8a30c4096e9194d52494
-
SHA512
c0b254a02253b2901669611523778b31fb29101bbb45c73ff8fcb7b3e43797a824f0f9854a63bb16c3cd420d41631d89f76b8e5f6dd95c29de567ac0eabda079
Static task
static1
Behavioral task
behavioral1
Sample
DATASHEET.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
DATASHEET.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
PRODUCT LIST.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
PRODUCT LIST.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.mkontakt.az - Port:
587 - Username:
[email protected] - Password:
Onyeoba111
Extracted
C:\Users\Admin\AppData\Local\Temp\F95B724EDE\Log.txt
masslogger
Extracted
azorult
http://217.160.254.33/index.php
Targets
-
-
Target
DATASHEET.exe
-
Size
899KB
-
MD5
226ccf305c0971c6634d956809ee618f
-
SHA1
55615741a7d8f84f7edaaf0c5bc851944532f98d
-
SHA256
4f7ce008febd9fe224c7a7cec7d8abf8c0db3611fd14d8aca135041d21d2b45c
-
SHA512
2e0a60a33409a36cc3703fefcaa64f3c7907e53736bc549c5c7f3c93e99d0aba1e4fcbbaa82fe301724f7f93e47fc5f12957452baee9829966193a568d22a80c
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
-
-
Target
PRODUCT LIST.exe
-
Size
294KB
-
MD5
a42e195a8a3de45dc2bc88e33af006a4
-
SHA1
1ce81ed627893bb2cb4aa83b008dcd10c9203dae
-
SHA256
655455e4c04c7fd6e624b752797305264093264c08b0ab45ebfceee5f7abbc66
-
SHA512
2a08c7e3110e080d2377e7e25f7cc3f1ff936ceb5e59f5f763955578b68cafe10b8d260a6b3147d0bd6d127774a298181bca8ad6256f40a42318df31756de90c
Score10/10-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Suspicious use of SetThreadContext
-