General

  • Target

    5DwZRGIVuBTsW0Q.exe

  • Size

    1001KB

  • Sample

    201210-cb2flrm7xa

  • MD5

    5cedb5fe0f3477096adac0f92aac2494

  • SHA1

    31314fe12fd6e083361fbd0d99d4a070fcb74760

  • SHA256

    640289c16945be9c80c83c59b2e09cf45b257bfff3f13088bcabdbf70c9726f7

  • SHA512

    9e8f1a0a92e8c1ce57f15edc07e828eeccd65d2be2587ee2393f84800562cb0e3407a74fb334d86a27e23dd2b277383a5e36c412f3714a1fa26b0878928bdba6

Malware Config

Targets

    • Target

      5DwZRGIVuBTsW0Q.exe

    • Size

      1001KB

    • MD5

      5cedb5fe0f3477096adac0f92aac2494

    • SHA1

      31314fe12fd6e083361fbd0d99d4a070fcb74760

    • SHA256

      640289c16945be9c80c83c59b2e09cf45b257bfff3f13088bcabdbf70c9726f7

    • SHA512

      9e8f1a0a92e8c1ce57f15edc07e828eeccd65d2be2587ee2393f84800562cb0e3407a74fb334d86a27e23dd2b277383a5e36c412f3714a1fa26b0878928bdba6

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks