General

  • Target

    Halkbank_Ekstre_20210111_074121_054441.pdf.exe

  • Size

    1.2MB

  • Sample

    210111-nlkyglbehx

  • MD5

    d15100cd7db78e81557d5bdc4b4ffa39

  • SHA1

    68b3327bd29d441095d088a10e1ec7fd189dce58

  • SHA256

    85729ea0b65a0a56b59f3e8ed961d4ce07f34804fb6b466b6d1c32e17cda4d8d

  • SHA512

    f1f7e41c07ca942d95854586056874ff84e042e3e7e99f8d874a1a79829609495107436a51c9784f0688fa6efc133d16052e5746794e1edf5c0c287ffc8f39e5

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.turkaykalibrasyon.com
  • Port:
    587
  • Username:
    turkay@turkaykalibrasyon.com
  • Password:
    Cc_8A46

Targets

    • Target

      Halkbank_Ekstre_20210111_074121_054441.pdf.exe

    • Size

      1.2MB

    • MD5

      d15100cd7db78e81557d5bdc4b4ffa39

    • SHA1

      68b3327bd29d441095d088a10e1ec7fd189dce58

    • SHA256

      85729ea0b65a0a56b59f3e8ed961d4ce07f34804fb6b466b6d1c32e17cda4d8d

    • SHA512

      f1f7e41c07ca942d95854586056874ff84e042e3e7e99f8d874a1a79829609495107436a51c9784f0688fa6efc133d16052e5746794e1edf5c0c287ffc8f39e5

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks