General

  • Target

    8e0487bd2f93a139d1ea66a227d135f0d0383ca310d90cb8622df4da10bf8a90

  • Size

    875KB

  • Sample

    220520-rkmrssagfq

  • MD5

    39d13c48bfbd30038fc7c8f9a4ddb8ff

  • SHA1

    cca1cd370b7ae14c92a8355b05a84eb50a44c976

  • SHA256

    8e0487bd2f93a139d1ea66a227d135f0d0383ca310d90cb8622df4da10bf8a90

  • SHA512

    bc3ba147c3e58cb47d712f32718dc9d6cd719006b8808d60350c8828fb059d7ba41a4f361eeda4bb22b7e72f129c23e1e68d17a8f5e158bfb8970f06b57414f4

Malware Config

Targets

    • Target

      DHL??11-05-2020.exe

    • Size

      1.1MB

    • MD5

      f786e547403c0dff7eda565cb5cb7c1b

    • SHA1

      2ecc1ac4325fd994336904c3d8126ec91b93efda

    • SHA256

      4b675daa6c54e06962ef1162fd7fe105fe9e76193626ec451dda29081cab3582

    • SHA512

      c129736dfead883d577980b4ce55ee107d28d1c12d94b42be6a2f5f36f862ce6ec3810b4430379c0b165940a0909f8e6a968b839314f3bc5f2e5530719045c8b

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks