General

  • Target

    349efe41afe8428972081d9288d3df4a22eccf1858768dc1e7539a666d6f2d5b

  • Size

    896KB

  • Sample

    220501-3te9vsegc5

  • MD5

    28e9a283a1280140d5d092547d493d0d

  • SHA1

    e6b30904907f76c91f94569519ef401accfdef5c

  • SHA256

    349efe41afe8428972081d9288d3df4a22eccf1858768dc1e7539a666d6f2d5b

  • SHA512

    3addaadcba17fd0923ff36db062494a3dc8459980f80db4951568ce60085c107b74495682cde9f49e845c87de60cd247ecc0b251b16fa3fbddf2c0f5d22ec501

Malware Config

Targets

    • Target

      349efe41afe8428972081d9288d3df4a22eccf1858768dc1e7539a666d6f2d5b

    • Size

      896KB

    • MD5

      28e9a283a1280140d5d092547d493d0d

    • SHA1

      e6b30904907f76c91f94569519ef401accfdef5c

    • SHA256

      349efe41afe8428972081d9288d3df4a22eccf1858768dc1e7539a666d6f2d5b

    • SHA512

      3addaadcba17fd0923ff36db062494a3dc8459980f80db4951568ce60085c107b74495682cde9f49e845c87de60cd247ecc0b251b16fa3fbddf2c0f5d22ec501

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks