General

  • Target

    f430a6438742117f61cf1f94d99833ef5ae225a3f718a7a25012ee8315dcbb8b

  • Size

    823KB

  • Sample

    220420-f6vhzsdbf7

  • MD5

    4c565dccf733ed8901e82def8c2f969a

  • SHA1

    82aca8816554eb811653b169a009001e34ee86c2

  • SHA256

    f430a6438742117f61cf1f94d99833ef5ae225a3f718a7a25012ee8315dcbb8b

  • SHA512

    92569fb9f98394612a345092f26b63dd94c75dc0d6d2cd750c899745b247cdfb59c4121af4fd16d38f8a44dafdd6a127b9cd0e9bf79c7b610d6688b14b9c8270

Malware Config

Targets

    • Target

      f430a6438742117f61cf1f94d99833ef5ae225a3f718a7a25012ee8315dcbb8b

    • Size

      823KB

    • MD5

      4c565dccf733ed8901e82def8c2f969a

    • SHA1

      82aca8816554eb811653b169a009001e34ee86c2

    • SHA256

      f430a6438742117f61cf1f94d99833ef5ae225a3f718a7a25012ee8315dcbb8b

    • SHA512

      92569fb9f98394612a345092f26b63dd94c75dc0d6d2cd750c899745b247cdfb59c4121af4fd16d38f8a44dafdd6a127b9cd0e9bf79c7b610d6688b14b9c8270

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks