General

  • Target

    106a72ea42836e5d06b29fe9f93294b6a14c33ff31669089851666645b176c8b

  • Size

    1.1MB

  • Sample

    220418-pwdbdsbaf2

  • MD5

    4a60e245aff468c7b6bed7dec3b877e3

  • SHA1

    6e215e7b54b4b7f412dd8735ca87a22284e67abc

  • SHA256

    106a72ea42836e5d06b29fe9f93294b6a14c33ff31669089851666645b176c8b

  • SHA512

    17d243a02365bc33e0b3edecf0cd1569b51bfa5bbc5ace6fd0c56063ac833411eddc575dced657dc1a0fa4bc867dabec19369b4bd92e97e7b6453a6baad76aad

Malware Config

Targets

    • Target

      106a72ea42836e5d06b29fe9f93294b6a14c33ff31669089851666645b176c8b

    • Size

      1.1MB

    • MD5

      4a60e245aff468c7b6bed7dec3b877e3

    • SHA1

      6e215e7b54b4b7f412dd8735ca87a22284e67abc

    • SHA256

      106a72ea42836e5d06b29fe9f93294b6a14c33ff31669089851666645b176c8b

    • SHA512

      17d243a02365bc33e0b3edecf0cd1569b51bfa5bbc5ace6fd0c56063ac833411eddc575dced657dc1a0fa4bc867dabec19369b4bd92e97e7b6453a6baad76aad

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks