General

  • Target

    TAF5xRBqc.rtf

  • Size

    1.5MB

  • Sample

    201207-l1kbwpjarx

  • MD5

    86c85d3237eb3d4c874298e84147b8dc

  • SHA1

    2ba0e41d45f5db2e87996549c3ebe7a149d1ee72

  • SHA256

    ad7a57d9fe77aaf343581db70a3fd4a434f6a8ae92fa8731622b3ecf12319321

  • SHA512

    1923bf993f9452eb94e5d9b3d4d62ebc43f29fdf053d282e84a752d4c42312564ead6aa38ab3f708aed132cbea2ecf199b8e46b1de0fc081803016f46b158f3a

Malware Config

Targets

    • Target

      TAF5xRBqc.rtf

    • Size

      1.5MB

    • MD5

      86c85d3237eb3d4c874298e84147b8dc

    • SHA1

      2ba0e41d45f5db2e87996549c3ebe7a149d1ee72

    • SHA256

      ad7a57d9fe77aaf343581db70a3fd4a434f6a8ae92fa8731622b3ecf12319321

    • SHA512

      1923bf993f9452eb94e5d9b3d4d62ebc43f29fdf053d282e84a752d4c42312564ead6aa38ab3f708aed132cbea2ecf199b8e46b1de0fc081803016f46b158f3a

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks