General

  • Target

    readerdc64_es_xa_crd_sec_install.exe

  • Size

    1.2MB

  • Sample

    220512-qsfssafcf8

  • MD5

    109ac5b1c71e338a891eea8f45525613

  • SHA1

    930c205a0627f99b0adf3b33ca480370ec7034f0

  • SHA256

    4421b611912f893aa288864ee328deda8e429b89716fae08912bee2d8885f419

  • SHA512

    f21c09b6be338e8fa323db65fcad5be026a70f943331d494f40b07d556682fbf058640035f52dfe267c67cc5f4fa890a7dec3674c83e44a65904fc403e8f1730

Malware Config

Targets

    • Target

      readerdc64_es_xa_crd_sec_install.exe

    • Size

      1.2MB

    • MD5

      109ac5b1c71e338a891eea8f45525613

    • SHA1

      930c205a0627f99b0adf3b33ca480370ec7034f0

    • SHA256

      4421b611912f893aa288864ee328deda8e429b89716fae08912bee2d8885f419

    • SHA512

      f21c09b6be338e8fa323db65fcad5be026a70f943331d494f40b07d556682fbf058640035f52dfe267c67cc5f4fa890a7dec3674c83e44a65904fc403e8f1730

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • Registers COM server for autorun

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Vidar log file

      Detects a log file produced by Vidar.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks