General

  • Target

    a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63

  • Size

    1.0MB

  • Sample

    220420-fxfy8shbaq

  • MD5

    c0ed9bbcff47e00344d20760e249ae66

  • SHA1

    d38438bc727646bccd72bed89428b69753b2178a

  • SHA256

    a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63

  • SHA512

    8c7b5def759dfeeb2e4d962a419a2f33adfcdb0668be37696eda9fe5ae81752a43b41b3415fb4a5c2be496f7c471a70be0725dd6f50725e86c9e666fec70eef7

Malware Config

Targets

    • Target

      a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63

    • Size

      1.0MB

    • MD5

      c0ed9bbcff47e00344d20760e249ae66

    • SHA1

      d38438bc727646bccd72bed89428b69753b2178a

    • SHA256

      a23452b73a4411048351ea4b33106feb883a70940ad0cc9ed46e2c32f8350d63

    • SHA512

      8c7b5def759dfeeb2e4d962a419a2f33adfcdb0668be37696eda9fe5ae81752a43b41b3415fb4a5c2be496f7c471a70be0725dd6f50725e86c9e666fec70eef7

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks