General

  • Target

    eae9fd488fe30bf1d81e928517f1b48f826ce1568c94d726e0b63a8596ad9124

  • Size

    729KB

  • Sample

    220520-3l4mgscaep

  • MD5

    03029ff538842f18964d42ef82b1562f

  • SHA1

    f030f9da426cb0ff3fb4e8a4200a2c6da76e8d75

  • SHA256

    eae9fd488fe30bf1d81e928517f1b48f826ce1568c94d726e0b63a8596ad9124

  • SHA512

    cef480b519b97711f7a159922b3b5daaf375f9506659930c2487c29af51d89357074fd7bfe4ad0b83a5b1337af543689aec7e26689e267dcc7d04167c0d79e9d

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\3B8E3C2477\Log.txt

Family

masslogger

Ransom Note
<|| v2.1.0.0 ||> User Name: Admin IP: 127.0.0.1 Location: United States Windows OS: Microsoft Windows 7 Ultimate 64bit Windows Serial Key: D4F6K-QK3RD-TMVMJ-BBMRX-3MBMV CPU: Intel Core Processor (Broadwell) GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 1:45:05 AM MassLogger Started: 5/21/2022 1:44:11 AM Interval: 96 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\Enquiry-030820..exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes: <|| WD Exclusion ||> Disabled <|| Binder ||> Disabled <|| Downloader ||> Disabled <|| USB Spread ||> Disabled <|| Window Searcher ||> Disabled <|| Bot Killer ||> Disabled <|| Search And Upload ||> Disabled <|| Telegram Desktop ||> Not Installed <|| Pidgin ||> Not Installed <|| FileZilla ||> Not Installed <|| Discord Tokken ||> Not Installed <|| NordVPN ||> Not Installed <|| Outlook ||> Not Installed <|| FoxMail ||> Not Installed <|| Thunderbird ||> Not Installed <|| FireFox ||> Not Found <|| QQ Browser ||> Not Installed <|| Chromium Recovery ||> Not Installed or Not Found <|| Keylogger And Clipboard ||> Disabled

Extracted

Path

C:\Users\Admin\AppData\Local\19E979543A\Log.txt

Family

masslogger

Ransom Note
<|| v2.1.0.0 ||> User Name: Admin IP: 154.61.71.13 Location: United States Windows OS: Microsoft Windows 10 Pro 64bit Windows Serial Key: W269N-WFGWX-YVC9B-4J6C9-T83GX CPU: Intel Core Processor (Broadwell) GPU: Microsoft Basic Display Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 1:44:01 AM MassLogger Started: 5/21/2022 1:43:55 AM Interval: 96 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\Enquiry-030820..exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes: <|| WD Exclusion ||> Disabled <|| Binder ||> Disabled <|| Downloader ||> Disabled <|| USB Spread ||> Disabled <|| Bot Killer ||> Disabled <|| Window Searcher ||> Disabled <|| Search And Upload ||> Disabled <|| Telegram Desktop ||> Not Installed <|| Pidgin ||> Not Installed <|| FileZilla ||> Not Installed <|| Discord Tokken ||> Not Installed <|| NordVPN ||> Not Installed <|| Outlook ||> Not Installed <|| FoxMail ||> Not Installed <|| Thunderbird ||> Not Installed <|| FireFox ||> Not Found <|| QQ Browser ||> Not Installed <|| Chromium Recovery ||> Not Installed or Not Found <|| Keylogger And Clipboard ||> Disabled

Targets

    • Target

      Enquiry-030820..exe

    • Size

      993KB

    • MD5

      a2a1d155dd4b111472471f6e5e8265e9

    • SHA1

      03f2f4c16e064c90fe75386b0805be981ea1b7d8

    • SHA256

      15ac6b1a7fdb92b545dae44b1a88d6328629944771bdce75002637cdbf299027

    • SHA512

      5f595ff5bbfdf226d4cbd6361490dd6ce46f594e108e60e61c59c1bf8f6c063e4b18758b6222653d1d20e7aadd3b02c38bb5ebc8ecdf9b6e611591bfdb0da383

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks