General

  • Target

    MkXhxWHcc49zLgc.exe

  • Size

    1.1MB

  • Sample

    200709-s5e3jf9yxs

  • MD5

    aaa7c56e1365273d298fc27167a9c2bf

  • SHA1

    c9836709996845921fa247cae630087455563672

  • SHA256

    e4b1c7f2f04d674f545b52a14617dfc553b65991c4779d1b22bf41982d1201ff

  • SHA512

    fd901395bdca4bd687d4746ed15007ec07923ff40f915d51ef3fb5e0777f576315deb8c51fbdf33381f49442fff80527bb03a1148892d63f33d6160d414ac158

Malware Config

Targets

    • Target

      MkXhxWHcc49zLgc.exe

    • Size

      1.1MB

    • MD5

      aaa7c56e1365273d298fc27167a9c2bf

    • SHA1

      c9836709996845921fa247cae630087455563672

    • SHA256

      e4b1c7f2f04d674f545b52a14617dfc553b65991c4779d1b22bf41982d1201ff

    • SHA512

      fd901395bdca4bd687d4746ed15007ec07923ff40f915d51ef3fb5e0777f576315deb8c51fbdf33381f49442fff80527bb03a1148892d63f33d6160d414ac158

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks