General
-
Target
90b541c5d2b2738109fe53bef96ac20d79f45997467fa7417c74bef812850b8c
-
Size
1.4MB
-
Sample
220521-xk5khacaa2
-
MD5
42ea996963b40fa149c967edb3def794
-
SHA1
3512df1624733f01b383d06a8c723ecd47fe2e1e
-
SHA256
90b541c5d2b2738109fe53bef96ac20d79f45997467fa7417c74bef812850b8c
-
SHA512
4bb335df18f75d13a7a28f3e2366d5b1e2ceebad6c877701d95ebbcfa18e425a2b882d9b9681f5adf6a2dc9509bfb347ef84c57203378ca62ba855c44d047b95
Static task
static1
Behavioral task
behavioral1
Sample
Veitstar Inquiry.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Veitstar Inquiry.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Dmacdavid
Extracted
C:\Users\Admin\AppData\Local\Temp\2EF8342664\Log.txt
masslogger
Targets
-
-
Target
Veitstar Inquiry.exe
-
Size
2.5MB
-
MD5
5c8c2fb2fbd3c20a62a107e34226e90f
-
SHA1
c85262bd4d832a4ef68ef1940cee8501d1cab90e
-
SHA256
44a169140fbd4a243478d8504cb62dd7a5d2225df55d058c4aa71dd0c0d7c480
-
SHA512
9912e0231369acce4cf7b63e1f2d06c76a0161bc85e13789ab02129774de8dcf6c57f30a694d8180491e7eb42112cd22c75d79587882f836255919fcde11f246
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-