General

  • Target

    kWRzqj4iO78z4ri.exe

  • Size

    746KB

  • Sample

    200707-eym74vgzk6

  • MD5

    9edb7a4a29110cd92c0f304fd69f8308

  • SHA1

    95f1be6b1e4f159712d415bfb99c8dd57202a18b

  • SHA256

    d47f5168e5b3b521b9e2722207e1fcf5be168c8dab409ffd575cba8c08fe1f9e

  • SHA512

    bb3dbd10ad536c69aed3a7963ba5f8e10e1f1d4a79d65ff7d7cfe5d4cff6331a128b0a6d8ce21b8dc6e936db633bbb47fa487857699d3797b86561c8849c3ebc

Malware Config

Targets

    • Target

      kWRzqj4iO78z4ri.exe

    • Size

      746KB

    • MD5

      9edb7a4a29110cd92c0f304fd69f8308

    • SHA1

      95f1be6b1e4f159712d415bfb99c8dd57202a18b

    • SHA256

      d47f5168e5b3b521b9e2722207e1fcf5be168c8dab409ffd575cba8c08fe1f9e

    • SHA512

      bb3dbd10ad536c69aed3a7963ba5f8e10e1f1d4a79d65ff7d7cfe5d4cff6331a128b0a6d8ce21b8dc6e936db633bbb47fa487857699d3797b86561c8849c3ebc

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks