General

  • Target

    bd72223afa837379fe320c88e0c18d6bffaa463615b4d68c1afbfd3bac4f5f93

  • Size

    966KB

  • Sample

    201109-ljcn4zymv6

  • MD5

    47d7b2a7ff9c35fc3b49bfb8c400f2d5

  • SHA1

    041a47cfdbc1a73c6418695a64179408487034e8

  • SHA256

    bd72223afa837379fe320c88e0c18d6bffaa463615b4d68c1afbfd3bac4f5f93

  • SHA512

    7c577d623ea794dbecb720e24c169e19f90e4bce1a5c854fb6ea65dd77bae00deefa81f73155447e4f13445f4eb7cb3ac9f102df4093d77433c8ebc3b5f7b935

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\5FADD7138A\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.4.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.51 Location: United States OS: Microsoft Windows 7 Professional 64bit CPU: Persocon Processor 2.5+ GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 11/10/2020 6:15:40 PM MassLogger Started: 11/10/2020 6:15:37 PM Interval: 1 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\bd72223afa837379fe320c88e0c18d6bffaa463615b4d68c1afbfd3bac4f5f93.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\5FADD7138A\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.4.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.51 Location: United States OS: Microsoft Windows 7 Professional 64bit CPU: Persocon Processor 2.5+ GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 11/10/2020 6:15:40 PM MassLogger Started: 11/10/2020 6:15:37 PM Interval: 1 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\bd72223afa837379fe320c88e0c18d6bffaa463615b4d68c1afbfd3bac4f5f93.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes: ### WD Exclusion ### Disabled

Targets

    • Target

      bd72223afa837379fe320c88e0c18d6bffaa463615b4d68c1afbfd3bac4f5f93

    • Size

      966KB

    • MD5

      47d7b2a7ff9c35fc3b49bfb8c400f2d5

    • SHA1

      041a47cfdbc1a73c6418695a64179408487034e8

    • SHA256

      bd72223afa837379fe320c88e0c18d6bffaa463615b4d68c1afbfd3bac4f5f93

    • SHA512

      7c577d623ea794dbecb720e24c169e19f90e4bce1a5c854fb6ea65dd77bae00deefa81f73155447e4f13445f4eb7cb3ac9f102df4093d77433c8ebc3b5f7b935

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • rezer0

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks