General

  • Target

    4615389657415d2ff06489dfe0e8394977fd68922796a6a1f1afbecab466d45a

  • Size

    794KB

  • Sample

    220521-b168dafhej

  • MD5

    6e709030c711516d954763ddeb1f7abe

  • SHA1

    8d1f4e58f782a4fb8acbf47a0d91eadc9a6ac7b1

  • SHA256

    4615389657415d2ff06489dfe0e8394977fd68922796a6a1f1afbecab466d45a

  • SHA512

    443fb776d2e81abd98ee70c64fd2db4ac97246ca66f47800a775596caf2303b55742592aeb48ffb897060626677fae0c334a2065bcadd27db61d3db0d0bf1c4a

Malware Config

Targets

    • Target

      RFQ TC3363 554 ref 5578.exe

    • Size

      930KB

    • MD5

      b420ec9b5e7102e29376ed8035492676

    • SHA1

      e78dde3f48dbb4cff8a0a156c240ad4f25fac806

    • SHA256

      61ab7d6bc7b5b5a3f90635ed4208d0528155a4283b1deb656e194caf198cba80

    • SHA512

      2f7297fad8c4c06f07aeb176ef17526a5d7d1f5ec278019ce5a09fa0460db7cf69569721d4d7d25bb45efb9d8c1caca4acc3783d2317bdb02ddad84d2ce5a135

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks