General

  • Target

    Bank Statement_pdf.exe

  • Size

    899KB

  • Sample

    200709-y6lsw2y48x

  • MD5

    1c3985f5c3ad3e9a5394d093237ecd72

  • SHA1

    9d3c319ac9c93ed1227c7808f8a8a16b935a6fcf

  • SHA256

    e91593299dba4d7f9362c8d64e701413af0384f0f7ecca356ab138497f3a8e4d

  • SHA512

    3f3ce2ddac434d8bc8cb8f5c376b31e63d54ccfb809907542bb5b0f6094a01049ba6e15e20e5c6b3af815248e3ec6ea1993194b68eeb78743fd88c7ec5037511

Malware Config

Targets

    • Target

      Bank Statement_pdf.exe

    • Size

      899KB

    • MD5

      1c3985f5c3ad3e9a5394d093237ecd72

    • SHA1

      9d3c319ac9c93ed1227c7808f8a8a16b935a6fcf

    • SHA256

      e91593299dba4d7f9362c8d64e701413af0384f0f7ecca356ab138497f3a8e4d

    • SHA512

      3f3ce2ddac434d8bc8cb8f5c376b31e63d54ccfb809907542bb5b0f6094a01049ba6e15e20e5c6b3af815248e3ec6ea1993194b68eeb78743fd88c7ec5037511

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks