General

  • Target

    7e8874cfbd36629e9bec7aeb253821f511e3a1296e8da614eeb96642d7257a65

  • Size

    1.7MB

  • Sample

    220520-2qjbnsfge8

  • MD5

    dedbeb432576c3a6d930b00e30ea624f

  • SHA1

    669e768a50bff972a5a5dabb34a5e6b393d49e7c

  • SHA256

    7e8874cfbd36629e9bec7aeb253821f511e3a1296e8da614eeb96642d7257a65

  • SHA512

    2662dfeb7663b62dfcda2a46fbd012b486b59a8def6d39dc7443891a3ee96a960155b77ddc7e955868d49fd85d49eee2f964fc3d4c5b1ac34d074a6ee51d8267

Malware Config

Targets

    • Target

      TILOCRYP.EXE

    • Size

      1.1MB

    • MD5

      204bdadf1189b3224b4ddc9317ae1559

    • SHA1

      27eafcc0591dc3742718a24f59aacd80a7dd3b47

    • SHA256

      3f83c090819bc1dd8a9c1db3588b51ecd839bf0ca85a21f552c4346abe09efdc

    • SHA512

      b73ebdc5a67acfa1b78ca1a18c2b74806034ac00e5d8eb6f35bb24e5e4106ee575886d70382c68be84f3b5f975a6a1b66a3a37c09a3492073bd318c99fbcca61

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks