General
-
Target
67a7100bbf102bed2773f56abdb1f761d7255bdf21ddf0a80bd2e7ec316af6e2
-
Size
820KB
-
Sample
230129-y946psdf3x
-
MD5
6e32f33a38ff5bfa5cd5883e9ea49b96
-
SHA1
3e3771a344d29ee1afd6a36d6360c0ed80ddb3ff
-
SHA256
67a7100bbf102bed2773f56abdb1f761d7255bdf21ddf0a80bd2e7ec316af6e2
-
SHA512
12fdcb1e8f64bcbd2861ffa75631f291ef35c2418be6576dbb9995b9cec3d30b32bd4ed76409e9a80cbfd02a3dc01836fae72c886643009e50ba55000bde90dd
-
SSDEEP
12288:wsJIlwYGu9Qz1dJmKmq33ckBx2dtkrtGq23qFsAiMJ9kbX/JjNzERmsqWPjtVnD5:wTl7AdFmqfBMpZzMJejyRpPfnf1
Static task
static1
Behavioral task
behavioral1
Sample
67a7100bbf102bed2773f56abdb1f761d7255bdf21ddf0a80bd2e7ec316af6e2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
67a7100bbf102bed2773f56abdb1f761d7255bdf21ddf0a80bd2e7ec316af6e2.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\5A87E7C061\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\Temp\0B7B20BDD4\Log.txt
masslogger
Targets
-
-
Target
67a7100bbf102bed2773f56abdb1f761d7255bdf21ddf0a80bd2e7ec316af6e2
-
Size
820KB
-
MD5
6e32f33a38ff5bfa5cd5883e9ea49b96
-
SHA1
3e3771a344d29ee1afd6a36d6360c0ed80ddb3ff
-
SHA256
67a7100bbf102bed2773f56abdb1f761d7255bdf21ddf0a80bd2e7ec316af6e2
-
SHA512
12fdcb1e8f64bcbd2861ffa75631f291ef35c2418be6576dbb9995b9cec3d30b32bd4ed76409e9a80cbfd02a3dc01836fae72c886643009e50ba55000bde90dd
-
SSDEEP
12288:wsJIlwYGu9Qz1dJmKmq33ckBx2dtkrtGq23qFsAiMJ9kbX/JjNzERmsqWPjtVnD5:wTl7AdFmqfBMpZzMJejyRpPfnf1
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main payload
-
MassLogger log file
Detects a log file produced by MassLogger.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-