General

  • Target

    b39153383e842489c69a9877a3af511296aff739b91a86ad85becfc23e7a1a90

  • Size

    1.1MB

  • Sample

    220414-ntqm9saah3

  • MD5

    5049982ec954b0ebc729caab7e35e406

  • SHA1

    e781a6227c87b7dae4535a3ca33ab8806a6f25e0

  • SHA256

    b39153383e842489c69a9877a3af511296aff739b91a86ad85becfc23e7a1a90

  • SHA512

    a7e66adad3e8df58276af5b04ee88635278d91ef88131d31482d76d0af3f4fcdb78f1f955009138d24a3e6b762531860644663960ca93512f494aede147b5c00

Malware Config

Targets

    • Target

      b39153383e842489c69a9877a3af511296aff739b91a86ad85becfc23e7a1a90

    • Size

      1.1MB

    • MD5

      5049982ec954b0ebc729caab7e35e406

    • SHA1

      e781a6227c87b7dae4535a3ca33ab8806a6f25e0

    • SHA256

      b39153383e842489c69a9877a3af511296aff739b91a86ad85becfc23e7a1a90

    • SHA512

      a7e66adad3e8df58276af5b04ee88635278d91ef88131d31482d76d0af3f4fcdb78f1f955009138d24a3e6b762531860644663960ca93512f494aede147b5c00

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks