General

  • Target

    sample (copy).vbs

  • Size

    868KB

  • Sample

    210115-4rhdrtbk8j

  • MD5

    9a4970c5db150a6a0bfc85a5cb626a05

  • SHA1

    ffd56a1a06736bc8b46e1c1353a4810efe4b0b4b

  • SHA256

    755577c3823e7282582c80e58f4d0bbfb3f6ada39bc8c5746a2ede25fb24fb4e

  • SHA512

    38a6e342e0d5ae99c1188045ec4c20b779a6c2c5c5337b226332722e824bb3836c1eea4f66b3a010bd651413f8152d9d801b6ab74327affcd9f74aa5b5402d5d

Malware Config

Targets

    • Target

      sample (copy).vbs

    • Size

      868KB

    • MD5

      9a4970c5db150a6a0bfc85a5cb626a05

    • SHA1

      ffd56a1a06736bc8b46e1c1353a4810efe4b0b4b

    • SHA256

      755577c3823e7282582c80e58f4d0bbfb3f6ada39bc8c5746a2ede25fb24fb4e

    • SHA512

      38a6e342e0d5ae99c1188045ec4c20b779a6c2c5c5337b226332722e824bb3836c1eea4f66b3a010bd651413f8152d9d801b6ab74327affcd9f74aa5b5402d5d

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks