General

  • Target

    Payment.exe

  • Size

    1.5MB

  • Sample

    200713-ad41mr1f9e

  • MD5

    ab56ad172a0bbb66aeff5c8d18aadc53

  • SHA1

    9e79bba575e0e09d1b9c0f06f298f9c020b57198

  • SHA256

    b22c648668d77e156bb1d3df67f22c0731bc3ea1010b4ddba7317f3f71b33329

  • SHA512

    c30ee4d5da355679b8c73ab9c52372e4487b79bedbc2689ce2d1103a28b0209fcd95c2f0a7a39c253ddda367136ec5d5225d492b5af220bd706a0e3b913a2ce3

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\E2C1E8F1FA\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.6.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.51 Location: United States Windows OS: Microsoft Windows 7 Professional 64bit Windows Serial Key: HYF8J-CVRMY-CM74G-RPHKF-PW487 CPU: Persocon Processor 2.5+ GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 7/13/2020 5:47:15 PM MassLogger Started: 7/13/2020 5:47:09 PM Interval: 2 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Targets

    • Target

      Payment.exe

    • Size

      1.5MB

    • MD5

      ab56ad172a0bbb66aeff5c8d18aadc53

    • SHA1

      9e79bba575e0e09d1b9c0f06f298f9c020b57198

    • SHA256

      b22c648668d77e156bb1d3df67f22c0731bc3ea1010b4ddba7317f3f71b33329

    • SHA512

      c30ee4d5da355679b8c73ab9c52372e4487b79bedbc2689ce2d1103a28b0209fcd95c2f0a7a39c253ddda367136ec5d5225d492b5af220bd706a0e3b913a2ce3

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks