General

  • Target

    3ba1d05f51633f70ad7eb0e69c9825980fbdf161a6e2ace1344f4cefcc27244a

  • Size

    821KB

  • Sample

    220420-kqgpeadfa6

  • MD5

    cbfb941abb5bbd544113c6540c72a08d

  • SHA1

    cab9f9416d5d8a12b897845ec40256dcc8b24939

  • SHA256

    3ba1d05f51633f70ad7eb0e69c9825980fbdf161a6e2ace1344f4cefcc27244a

  • SHA512

    60e509c3ef5dd002cb8a5d90272a351bc687326c1be72c067ba63ef409ce4b09db810b71987aefbcd53cdd3c0ff720248dc160efe20cd7a3132b19c321e2c5ce

Malware Config

Targets

    • Target

      3ba1d05f51633f70ad7eb0e69c9825980fbdf161a6e2ace1344f4cefcc27244a

    • Size

      821KB

    • MD5

      cbfb941abb5bbd544113c6540c72a08d

    • SHA1

      cab9f9416d5d8a12b897845ec40256dcc8b24939

    • SHA256

      3ba1d05f51633f70ad7eb0e69c9825980fbdf161a6e2ace1344f4cefcc27244a

    • SHA512

      60e509c3ef5dd002cb8a5d90272a351bc687326c1be72c067ba63ef409ce4b09db810b71987aefbcd53cdd3c0ff720248dc160efe20cd7a3132b19c321e2c5ce

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks