General
-
Target
0971cbc70ca0abf88a7059f0eb904112d64db2355890bc956244b44371534a28
-
Size
845KB
-
Sample
220521-ppqm5sfgb9
-
MD5
88ee58092059ef41e919604e746f4be1
-
SHA1
382ed1e911833923c5911f6fb8f67eb2ea8fc635
-
SHA256
0971cbc70ca0abf88a7059f0eb904112d64db2355890bc956244b44371534a28
-
SHA512
91ce0816acd3415f1d67ac599bed9427d0b2a555b1ec73eac5131e5e3d3ea07a09372627cbefbb4f128b25cd3172bfbfe67786ed0e501175cfd3b7943ce09c13
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
RFQ.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\3B8E3C2477\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.ucfblr.com - Port:
587 - Username:
[email protected] - Password:
Nam@123s#
Targets
-
-
Target
RFQ.exe
-
Size
875KB
-
MD5
d09e24ff3e15d721e4a7feac4e9b1ef5
-
SHA1
12017612e0361f56a2d1fd593a3b54895a34f4a9
-
SHA256
776a4ff176f431da77a945cf047746d71aa1b629c743d16a8018f883692cf7c8
-
SHA512
9c084b6b92a0cfb0bf7d3eef6aee45a3fd881a968b95e07b268093bb7b41d52bae883b4df012f58afe36d044fa75a6da37384e84b23166b7e6dc7ac770c43d2d
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-