General

  • Target

    b770e8a6e3fa734aef0f401a988cfbe6925ac4da81c76f7dc4b0e8d1d105227a

  • Size

    659KB

  • Sample

    220508-jeqx9sbca2

  • MD5

    cfb1b53060223753fed8d9cac55b9aa9

  • SHA1

    8c74700d2eceb7d60cb1ba5f2c14e4ed75f9f61e

  • SHA256

    b770e8a6e3fa734aef0f401a988cfbe6925ac4da81c76f7dc4b0e8d1d105227a

  • SHA512

    24f3758e16616b00d19d68291971bb75967b0560b9922b5f0d584afb538d4acd435cdd7c56f9271eee3d11bec5b0410b1a2b51f9a7becae7207e2c46cc83dc40

Malware Config

Targets

    • Target

      b770e8a6e3fa734aef0f401a988cfbe6925ac4da81c76f7dc4b0e8d1d105227a

    • Size

      659KB

    • MD5

      cfb1b53060223753fed8d9cac55b9aa9

    • SHA1

      8c74700d2eceb7d60cb1ba5f2c14e4ed75f9f61e

    • SHA256

      b770e8a6e3fa734aef0f401a988cfbe6925ac4da81c76f7dc4b0e8d1d105227a

    • SHA512

      24f3758e16616b00d19d68291971bb75967b0560b9922b5f0d584afb538d4acd435cdd7c56f9271eee3d11bec5b0410b1a2b51f9a7becae7207e2c46cc83dc40

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks