Description
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
829578ed964e4efeb78499514a145cb2886dcc5ffb769c836981919e6d53949f
658KB
220521-pv1qasbcdp
c54f679d81ba63e0b112d936a299bf78
378ad468459916391f119c7cb0955c167b295b68
829578ed964e4efeb78499514a145cb2886dcc5ffb769c836981919e6d53949f
6e924f93a2a49e13ebddb6699a311a9c0b4b07e9fa25b71e1eee5b547465443584a78529359b916a70169c8ba18f098f44a33ecd07003d9a54695ce427947ce5
Path | C:\Users\Admin\AppData\Local\Temp\3B8E3C2477\Log.txt |
Family | masslogger |
Ransom Note |
#################################################################
MassLogger v2.0.0.0
#################################################################
### Logger Details ###
User Name: Admin
IP: 154.61.71.50
Location: United States
Windows OS: Microsoft Windows 7 Ultimate 64bit
Windows Serial Key: D4F6K-QK3RD-TMVMJ-BBMRX-3MBMV
CPU: Intel Core Processor (Broadwell)
GPU: Standard VGA Graphics Adapter
AV: NA
Screen Resolution: 1280x720
Current Time: 5/21/2022 2:48:00 PM
MassLogger Started: 5/21/2022 2:47:49 PM
Interval: 2 hour
MassLogger Process: C:\Users\Admin\AppData\Local\Temp\deiUUj8mpdyf36k.exe
MassLogger Melt: false
MassLogger Exit after delivery: false
As Administrator: True
Processes:
|
deiUUj8mpdyf36k.exe
4c2978004f201c8a9d8f86ba5a00be29
691KB
06610092027ca2632d771a228d36358b77c8bd65
43756195653d9b20db70b3b2700d6ece0e927da322db216d12e6eeb6af316f3f
bf5328040efaafce37bc3df6a3ec4979857b34a7f83763ee333e0ee583efdc8d7b7d7d80f6ffa21aa25f22585f2d89c07e24dc9b2140fd73f4d070d33ee630ec
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
Detects a log file produced by MassLogger.
BIOS information is often read in order to detect sandboxing environments.
Looks up country code configured in the registry, likely geofence.
Infostealers often target stored browser data, which can include saved credentials etc.
Uses a legitimate IP lookup service to find the infected system's external IP.
Disk information is often read in order to detect sandboxing environments.