General

  • Target

    Down Payment.doc

  • Size

    1.6MB

  • Sample

    201217-6n2n96dzv2

  • MD5

    0ff5919b6552c497ef64d831574a1c62

  • SHA1

    d892fb651e8d336e48ad0a0f7d88c6dd35359699

  • SHA256

    52fa2e8c2e126d16feab59c47cdb6764e30a532000db97388ded751b0471e688

  • SHA512

    26467ef913d1a1f09bea9bf44ede0431562604230b2a785127b56e947dd7d3e5623a3b5f18cd9fd021b5ed4b5545e7bd2796cf33b9b6c59aefb0e6ca51464e6a

Malware Config

Targets

    • Target

      Down Payment.doc

    • Size

      1.6MB

    • MD5

      0ff5919b6552c497ef64d831574a1c62

    • SHA1

      d892fb651e8d336e48ad0a0f7d88c6dd35359699

    • SHA256

      52fa2e8c2e126d16feab59c47cdb6764e30a532000db97388ded751b0471e688

    • SHA512

      26467ef913d1a1f09bea9bf44ede0431562604230b2a785127b56e947dd7d3e5623a3b5f18cd9fd021b5ed4b5545e7bd2796cf33b9b6c59aefb0e6ca51464e6a

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks