General

  • Target

    CDO1029-022019 PURCHASE ORDER_PDF.exe

  • Size

    1.8MB

  • Sample

    201109-k25l7lnjr2

  • MD5

    51a186f64b59903d7217774720d0c34d

  • SHA1

    f8454553259eb85213545c5fa3a7c558b6424642

  • SHA256

    812efd5114e9e1d9ae0898435aa593322a4ef9a39ddd1befe6fc9382ed1cfc0f

  • SHA512

    17503c88251411ce7fa6188d9eecfb8e0037d0858dac2820a33b0214d6f23b8306b65a96b559eea386971cd76edd7b3f01c4a6be236acd07cd893ce379870145

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.gcco.dz
  • Port:
    587
  • Username:
    contact@gcco.dz
  • Password:
    CKnt@CtGcc0

Targets

    • Target

      CDO1029-022019 PURCHASE ORDER_PDF.exe

    • Size

      1.8MB

    • MD5

      51a186f64b59903d7217774720d0c34d

    • SHA1

      f8454553259eb85213545c5fa3a7c558b6424642

    • SHA256

      812efd5114e9e1d9ae0898435aa593322a4ef9a39ddd1befe6fc9382ed1cfc0f

    • SHA512

      17503c88251411ce7fa6188d9eecfb8e0037d0858dac2820a33b0214d6f23b8306b65a96b559eea386971cd76edd7b3f01c4a6be236acd07cd893ce379870145

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • rezer0

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks