General
-
Target
4f7ce008febd9fe224c7a7cec7d8abf8c0db3611fd14d8aca135041d21d2b45c
-
Size
899KB
-
Sample
220521-ppc22sfga7
-
MD5
226ccf305c0971c6634d956809ee618f
-
SHA1
55615741a7d8f84f7edaaf0c5bc851944532f98d
-
SHA256
4f7ce008febd9fe224c7a7cec7d8abf8c0db3611fd14d8aca135041d21d2b45c
-
SHA512
2e0a60a33409a36cc3703fefcaa64f3c7907e53736bc549c5c7f3c93e99d0aba1e4fcbbaa82fe301724f7f93e47fc5f12957452baee9829966193a568d22a80c
Static task
static1
Behavioral task
behavioral1
Sample
4f7ce008febd9fe224c7a7cec7d8abf8c0db3611fd14d8aca135041d21d2b45c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4f7ce008febd9fe224c7a7cec7d8abf8c0db3611fd14d8aca135041d21d2b45c.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.mkontakt.az - Port:
587 - Username:
[email protected] - Password:
Onyeoba111
Extracted
C:\Users\Admin\AppData\Local\Temp\F95B724EDE\Log.txt
masslogger
Targets
-
-
Target
4f7ce008febd9fe224c7a7cec7d8abf8c0db3611fd14d8aca135041d21d2b45c
-
Size
899KB
-
MD5
226ccf305c0971c6634d956809ee618f
-
SHA1
55615741a7d8f84f7edaaf0c5bc851944532f98d
-
SHA256
4f7ce008febd9fe224c7a7cec7d8abf8c0db3611fd14d8aca135041d21d2b45c
-
SHA512
2e0a60a33409a36cc3703fefcaa64f3c7907e53736bc549c5c7f3c93e99d0aba1e4fcbbaa82fe301724f7f93e47fc5f12957452baee9829966193a568d22a80c
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-