General

  • Target

    74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6

  • Size

    754KB

  • Sample

    220520-11ln4seec6

  • MD5

    ca12eb7a1b83c0ab450644abf40a6b6c

  • SHA1

    d42c8a7c8b17e05fad9463ad7fb6cc87511e27b6

  • SHA256

    74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6

  • SHA512

    492d936d47c2bc60d15b1a367c1b63803ed0c9f06a4a3a0d09efedcc63d79c82794b1be43cec48a95232ee39d5ef1f62eb7e4c75a145f741cd32b92ce4591d64

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\8506BBE7FF\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.5.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.13 Location: United States OS: Microsoft Windows 7 Ultimate 64bit CPU: Intel Core Processor (Broadwell) GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 12:07:32 AM MassLogger Started: 5/21/2022 12:07:24 AM Interval: 2 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6.exe MassLogger Melt: true MassLogger Exit after delivery: false As Administrator: True Processes:

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\8506BBE7FF\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.5.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.13 Location: United States OS: Microsoft Windows 7 Ultimate 64bit CPU: Intel Core Processor (Broadwell) GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 12:07:32 AM MassLogger Started: 5/21/2022 12:07:24 AM Interval: 2 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6.exe MassLogger Melt: true MassLogger Exit after delivery: false As Administrator: True Processes: ### WD Exclusion ### Disabled

Targets

    • Target

      74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6

    • Size

      754KB

    • MD5

      ca12eb7a1b83c0ab450644abf40a6b6c

    • SHA1

      d42c8a7c8b17e05fad9463ad7fb6cc87511e27b6

    • SHA256

      74ff711492a61aca0091936e7c5e20d93138fccd4899c0d84ff55307253d4bc6

    • SHA512

      492d936d47c2bc60d15b1a367c1b63803ed0c9f06a4a3a0d09efedcc63d79c82794b1be43cec48a95232ee39d5ef1f62eb7e4c75a145f741cd32b92ce4591d64

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks