General

  • Target

    Our New Order Jan 11 2020 at 2.30_PVV440_PDF.exe

  • Size

    718KB

  • Sample

    210112-jnhfplryh2

  • MD5

    44d0f64678ae63a17b6c535d60f7dd47

  • SHA1

    ea9e2a939d111c57b1a1da10805433e46c86e485

  • SHA256

    08a9b841c509bb0171f6899c3357e6b2cc47ce64e352315c4a8aaa4961ad0673

  • SHA512

    93ef6d531f676cfb6072618c21760af48b9722b3e571eaa580270dd54e5a65c7bc120d04dd3e2f90543e7d8acf7aa2061930275d9f73d13633c968819f0250ad

Malware Config

Targets

    • Target

      Our New Order Jan 11 2020 at 2.30_PVV440_PDF.exe

    • Size

      718KB

    • MD5

      44d0f64678ae63a17b6c535d60f7dd47

    • SHA1

      ea9e2a939d111c57b1a1da10805433e46c86e485

    • SHA256

      08a9b841c509bb0171f6899c3357e6b2cc47ce64e352315c4a8aaa4961ad0673

    • SHA512

      93ef6d531f676cfb6072618c21760af48b9722b3e571eaa580270dd54e5a65c7bc120d04dd3e2f90543e7d8acf7aa2061930275d9f73d13633c968819f0250ad

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks