General

  • Target

    IMG_41000132900014231000655.iso

  • Size

    1.2MB

  • Sample

    200708-rnzzw4bz36

  • MD5

    3f4eea2a8e11c12ea2aa04036748452e

  • SHA1

    edc1219ee567757604a2c8db1a4d672a6e8b3a71

  • SHA256

    afda5e7d83904ec23c803834d6d7e060111c205f05e0b9cdc191e192c9baaeb4

  • SHA512

    d3a5bd2b17611c9ea8207495e2d09e60fa9f6682e68a17d499a057c1bc14c93f2875477cc3fe8eba0d2dd514f989eee591002c30d5ffd65f2e0b32bc4ad67b1f

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    akachukwu123@

Targets

    • Target

      IMG_4100.SCR

    • Size

      677KB

    • MD5

      565b124296b7b1c9da28495b2c4b9a75

    • SHA1

      cddf5eed87b8e3c55a37e4d24b105f7bcbc099fc

    • SHA256

      6deeb1205f1768b632f623fc0133a963fe374e3f68c3f345948a6820f232743a

    • SHA512

      8667ccce26499354817d0f91dae68def592ae9ed29f0d5422ca59f4806c5e6cc918b989824dc252148c3680fc7260b5fd93fafea3db0646e740ffa9a8bdb9300

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks