General

  • Target

    f9bebc15ea243aab82c91f22098a4dd0c50404346e5c0c2c4f507e4b1223d9ba

  • Size

    683KB

  • Sample

    220503-zeg85acba4

  • MD5

    5cbfddc1c8d0445501a44500dd99d326

  • SHA1

    9b0190ed95bb6070f96c2d4e6d8f43209e68ace9

  • SHA256

    f9bebc15ea243aab82c91f22098a4dd0c50404346e5c0c2c4f507e4b1223d9ba

  • SHA512

    a8942124c1a954c5bc1e8e5100bff5a3c1f8466bac996fe69fdc7ba5a054ee21fab815e3d921ed77e33fa9640b5f5cc2317c83d07b085f3a8fa3b675c5cc0b98

Malware Config

Targets

    • Target

      payment swift.exe

    • Size

      929KB

    • MD5

      c4cf28c1d5e4da94c3391b90cd91671d

    • SHA1

      2c0db45e4852ab67255f78fe6921ada7a305244e

    • SHA256

      433c68e89fe741e7ec59e064861baf726ab0b8637849d9d92fa5e3a2819d211c

    • SHA512

      23590c2584a04127ec7c75f5f642a6884715390158b897e3617d4cbd536d6369388a0f3cce6d926ae7bf3e149d4cc8c99f82a35e340553421411d1c624506f39

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • Turns off Windows Defender SpyNet reporting

    • Windows security bypass

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

6
T1112

Disabling Security Tools

4
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks