General
-
Target
3ecc0863d79785e8b6cb8bf003fcff6c41195e278aaed426ed26144b11d3710c
-
Size
2.1MB
-
Sample
220521-pxv8lagbd7
-
MD5
e44b3f131a4d35aea1f0990816b944f0
-
SHA1
6ee21f16b4c5422108166a05af9768e3317f8be8
-
SHA256
3ecc0863d79785e8b6cb8bf003fcff6c41195e278aaed426ed26144b11d3710c
-
SHA512
d5c6f470d90f7b68ed46103127a312ca93eed173ca6d1e2b4af0fc695fbdda01bcd09d00641d9a65076a070cd2bad442b33c327322e6e8cc3ce842d6ac296b19
Static task
static1
Behavioral task
behavioral1
Sample
PO_75462.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PO_75462.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
PO_75463.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
PO_75463.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
cruizjamesvhjkl@
Extracted
C:\Users\Admin\AppData\Local\Temp\F95B724EDE\Log.txt
masslogger
Targets
-
-
Target
PO_75462.EXE
-
Size
768KB
-
MD5
22dbfe74635797260671cd5dbbf0a3bc
-
SHA1
8cbdde1a2319ee60c9f6a9e05d2879362ab44668
-
SHA256
6a83f449fc1dd1f88e89ba47a29c8e3a12b04145ae4377cddc5ca5a93ead0c91
-
SHA512
713fa04c7dbf9612bf69336d0cc3b56f433db712a516a6496160706135fad58e8a31cb2a54e893ecebb49b34bf7466b330d44f1e9446fde0af9cda3f118eb88e
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
PO_75463.EXE
-
Size
821KB
-
MD5
0e39e0f49e3f74b7fe492f2f9b4e0969
-
SHA1
bc7fce8afc2a2d379e3e0714191dae859e3771a8
-
SHA256
b8ac4a45dbd25ba8bb4f71d53bb8615f6d00b9be95b6e976567377957d92c428
-
SHA512
a9b7539a91aa8593b5a15f2536069591e105ab75484a2bf3900aedbe9c2f6ab6bbed33ab000995f776471f51c86df17a17475c3997a000b854324d42eec4783c
Score10/10-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-