General

  • Target

    fcca4c77f2f22f608aafee951d87a658.exe

  • Size

    1.1MB

  • Sample

    200713-hzg547jnbs

  • MD5

    fcca4c77f2f22f608aafee951d87a658

  • SHA1

    90da9029f90c7447ba9e6c11e753c10e28039b29

  • SHA256

    e00adf465a40f8b65f0335f1e84d5b53cf4a2d1f96c97345925d2afe35fae98e

  • SHA512

    2dfb93c3b6992ded3cd1f3b629b7ab82385381f1dfb045c26acb36234d14bd6f91c8330111c7d30f646dbfd32e2b69fb77291a2b1b2973c6a21a013b83f855be

Malware Config

Targets

    • Target

      fcca4c77f2f22f608aafee951d87a658.exe

    • Size

      1.1MB

    • MD5

      fcca4c77f2f22f608aafee951d87a658

    • SHA1

      90da9029f90c7447ba9e6c11e753c10e28039b29

    • SHA256

      e00adf465a40f8b65f0335f1e84d5b53cf4a2d1f96c97345925d2afe35fae98e

    • SHA512

      2dfb93c3b6992ded3cd1f3b629b7ab82385381f1dfb045c26acb36234d14bd6f91c8330111c7d30f646dbfd32e2b69fb77291a2b1b2973c6a21a013b83f855be

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks