General

  • Target

    shipping documents.exe

  • Size

    1.3MB

  • Sample

    200707-kclmeexd7x

  • MD5

    78c8c791d10aa23e7ba57360a846323b

  • SHA1

    4bd459cdd35e5e649dc334271d85cfd6e6fbcdca

  • SHA256

    6d430704bd3c6594f4732ec7e0f4bc0b899e93ac4d82d7f32da912dc6bdb9c35

  • SHA512

    6f9f0afdaec442f1576e7d8164ace263c5689c34866be78f467071521edece473b81ad1817a0cd829accedbb15a13b76beaddffb24e745bb75b15ed593e73ed5

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\C8A579F880\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.4.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.13 Location: United States OS: Microsoft Windows 7 Professional 64bit CPU: Persocon Processor 2.5+ GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 7/7/2020 10:25:22 AM MassLogger Started: 7/7/2020 10:25:14 AM Interval: 96 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\shipping documents.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\480F96756F\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.4.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.51 Location: United States OS: Microsoft Windows 10 Pro64bit CPU: Persocon Processor 2.5+ GPU: Microsoft Basic Display Adapter AV: NA Screen Resolution: 1280x720 Current Time: 7/7/2020 8:25:30 AM MassLogger Started: 7/7/2020 8:25:27 AM Interval: 96 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\shipping documents.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Targets

    • Target

      shipping documents.exe

    • Size

      1.3MB

    • MD5

      78c8c791d10aa23e7ba57360a846323b

    • SHA1

      4bd459cdd35e5e649dc334271d85cfd6e6fbcdca

    • SHA256

      6d430704bd3c6594f4732ec7e0f4bc0b899e93ac4d82d7f32da912dc6bdb9c35

    • SHA512

      6f9f0afdaec442f1576e7d8164ace263c5689c34866be78f467071521edece473b81ad1817a0cd829accedbb15a13b76beaddffb24e745bb75b15ed593e73ed5

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks