General

  • Target

    139685166623757886e856232304c42d1f28af11b43498ffbd4c43f45da4fcc6

  • Size

    1.6MB

  • Sample

    220521-b2kqrsfhfl

  • MD5

    66ad80f8660d2ca9716a3cdc8f53d1d5

  • SHA1

    832fc0de2583a6584c64136df504d33ec850e78a

  • SHA256

    139685166623757886e856232304c42d1f28af11b43498ffbd4c43f45da4fcc6

  • SHA512

    e33b9b2b901dd21f24b91281793266845346cc4011f46493931842326349fc012f0d77a577cd6dffb6ea486fd654e6736be4bf31fc3adb77c5b4f0f12aec1e70

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    goodpayment12345

Targets

    • Target

      Payment Advice Copy.exe

    • Size

      1.7MB

    • MD5

      42133af0845add0288dfa643f83e4097

    • SHA1

      a2879c30d6ec2ba9531018e4ed61a411aba66857

    • SHA256

      7e26ace88d11ff4270b4dfcd7329e5ebd1000acbe4de1a5de1ae4c023de66c90

    • SHA512

      5856fe8bcb87bb042fd15be1cd584f543c6252811ec38fb97de18b5556e51d808c4a8950b46a1b8e511d02ddd3532b54a81efb466afb349f8fe8be3cf0cae091

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks