General

  • Target

    c45cefc699ab04e4709c9cd3e8a49bb3.exe

  • Size

    1.1MB

  • Sample

    200713-s5gbvqmb62

  • MD5

    c45cefc699ab04e4709c9cd3e8a49bb3

  • SHA1

    e4e34cdb66b393283bfd0441ac3d3fea3c492f89

  • SHA256

    f5f9d13ad521590ab458db196ce2e06d2d832cd179f445a75a86bf2fedbfcf40

  • SHA512

    1d015cd4fe98e700ec0b24cc4f5885ccb5f47ba544b8a508340accdf32ea62740b3a1f72346fe5e395c5a939d312e7cb7203f354e98f28cad698e8c84dff00d1

Malware Config

Targets

    • Target

      c45cefc699ab04e4709c9cd3e8a49bb3.exe

    • Size

      1.1MB

    • MD5

      c45cefc699ab04e4709c9cd3e8a49bb3

    • SHA1

      e4e34cdb66b393283bfd0441ac3d3fea3c492f89

    • SHA256

      f5f9d13ad521590ab458db196ce2e06d2d832cd179f445a75a86bf2fedbfcf40

    • SHA512

      1d015cd4fe98e700ec0b24cc4f5885ccb5f47ba544b8a508340accdf32ea62740b3a1f72346fe5e395c5a939d312e7cb7203f354e98f28cad698e8c84dff00d1

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks