General

  • Target

    Ziraat Bankasi Swift Messaji.exe

  • Size

    1.3MB

  • Sample

    200713-r3xn39kg7a

  • MD5

    7ba9c730b33fd37be0eec329aabeb6a0

  • SHA1

    eabc80e887de547dc8dd16d4d0a515df48f30791

  • SHA256

    30dac0d69e366db4ce57a0935d5619e4bcebfcbaa9f14b7618970cc2aaa522f4

  • SHA512

    a8ac548c69d3698c87a18291577e6ddc3912c6009878382c3b1bc83cd3ad2b96f39cd60f797a60ae75bb992c413dc35a6f2a4fb844640a621cf88d75a93381fc

Malware Config

Targets

    • Target

      Ziraat Bankasi Swift Messaji.exe

    • Size

      1.3MB

    • MD5

      7ba9c730b33fd37be0eec329aabeb6a0

    • SHA1

      eabc80e887de547dc8dd16d4d0a515df48f30791

    • SHA256

      30dac0d69e366db4ce57a0935d5619e4bcebfcbaa9f14b7618970cc2aaa522f4

    • SHA512

      a8ac548c69d3698c87a18291577e6ddc3912c6009878382c3b1bc83cd3ad2b96f39cd60f797a60ae75bb992c413dc35a6f2a4fb844640a621cf88d75a93381fc

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run entry to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks