General

  • Target

    52b1565bb8a50701d219f361929ea870.exe

  • Size

    650KB

  • Sample

    201202-tcqh8wpk6s

  • MD5

    52b1565bb8a50701d219f361929ea870

  • SHA1

    aa6e4ce4342cb755a2fe894288534a04bc23f367

  • SHA256

    9b1d91114fdc8c143afbedc2475e69a539c81d19eeee4ba9301da81b794efaf7

  • SHA512

    6a9028a90574cb6f6431395697b4a23b7b67cb69738a2d3b29359b7c91a7e93c0c10d8c120699da51bbf9b216d9da75361341749a381ab2ed6036e25237c1106

Malware Config

Targets

    • Target

      52b1565bb8a50701d219f361929ea870.exe

    • Size

      650KB

    • MD5

      52b1565bb8a50701d219f361929ea870

    • SHA1

      aa6e4ce4342cb755a2fe894288534a04bc23f367

    • SHA256

      9b1d91114fdc8c143afbedc2475e69a539c81d19eeee4ba9301da81b794efaf7

    • SHA512

      6a9028a90574cb6f6431395697b4a23b7b67cb69738a2d3b29359b7c91a7e93c0c10d8c120699da51bbf9b216d9da75361341749a381ab2ed6036e25237c1106

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Modifies system executable filetype association

    • Beds Protector Packer

      Detects Beds Protector packer used to load .NET malware.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks