General

  • Target

    20a4e9a7d6416e639eea0b2b5bb70e005406be250f6b2aa4a38b5deedad29f6a

  • Size

    864KB

  • Sample

    220420-cqk3tsdchp

  • MD5

    dba45b78198d8bc0d5baddecc15e58a0

  • SHA1

    51324f74e8bb21ac03fe082bf03de3eaaa83503d

  • SHA256

    20a4e9a7d6416e639eea0b2b5bb70e005406be250f6b2aa4a38b5deedad29f6a

  • SHA512

    9f14b263ec835db48dfdd278d61ad07b1e075075fa9e5fe23d26d61c08f7b061dcf6efc9d8c9591ce0fa43f48a71247d5a73ed2fb6ba48d00556e12ab1ca0c03

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.krsmakina.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    XqDx*4o&I0w,

Targets

    • Target

      20a4e9a7d6416e639eea0b2b5bb70e005406be250f6b2aa4a38b5deedad29f6a

    • Size

      864KB

    • MD5

      dba45b78198d8bc0d5baddecc15e58a0

    • SHA1

      51324f74e8bb21ac03fe082bf03de3eaaa83503d

    • SHA256

      20a4e9a7d6416e639eea0b2b5bb70e005406be250f6b2aa4a38b5deedad29f6a

    • SHA512

      9f14b263ec835db48dfdd278d61ad07b1e075075fa9e5fe23d26d61c08f7b061dcf6efc9d8c9591ce0fa43f48a71247d5a73ed2fb6ba48d00556e12ab1ca0c03

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks