General

  • Target

    d36fb8e51189e998623727a766a4d8ed.exe

  • Size

    1.1MB

  • Sample

    200713-s6fc23n4dn

  • MD5

    d36fb8e51189e998623727a766a4d8ed

  • SHA1

    afa53ad8b0f01071ab99d015c89d2846adfc0c54

  • SHA256

    6eb458072d13aa27fa36cfcd143e0f32af2caa2af5639cd3592cefe48811aaad

  • SHA512

    4442b88a5260c3de61c973004fee39a3f84e442c014deb475e01942c67e46ae0b57a09e6450f2f7090dccd78e7f6f205dc787dd45e95680b971c99ba9ff076b7

Malware Config

Targets

    • Target

      d36fb8e51189e998623727a766a4d8ed.exe

    • Size

      1.1MB

    • MD5

      d36fb8e51189e998623727a766a4d8ed

    • SHA1

      afa53ad8b0f01071ab99d015c89d2846adfc0c54

    • SHA256

      6eb458072d13aa27fa36cfcd143e0f32af2caa2af5639cd3592cefe48811aaad

    • SHA512

      4442b88a5260c3de61c973004fee39a3f84e442c014deb475e01942c67e46ae0b57a09e6450f2f7090dccd78e7f6f205dc787dd45e95680b971c99ba9ff076b7

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks