General

  • Target

    70A12162020.doc

  • Size

    526KB

  • Sample

    201217-fnbxtatd6s

  • MD5

    ed75e6e71d66d381295826453ae631e0

  • SHA1

    b7c29ebe55ac21e5893cdb332b72761ed6441cd9

  • SHA256

    320592aa53514c7fd425f4c691e4be802ca964955d5a6fdd960a8725c36737b4

  • SHA512

    07f69b17d5c75db4f4151712648b5d2cae0849f0593f8cac5a22548f4eda64455c0847f2e424b5f05faa3f69b96cdd861087919c4eafc0a764b63cff3eef9682

Malware Config

Targets

    • Target

      70A12162020.doc

    • Size

      526KB

    • MD5

      ed75e6e71d66d381295826453ae631e0

    • SHA1

      b7c29ebe55ac21e5893cdb332b72761ed6441cd9

    • SHA256

      320592aa53514c7fd425f4c691e4be802ca964955d5a6fdd960a8725c36737b4

    • SHA512

      07f69b17d5c75db4f4151712648b5d2cae0849f0593f8cac5a22548f4eda64455c0847f2e424b5f05faa3f69b96cdd861087919c4eafc0a764b63cff3eef9682

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Tasks