General

  • Target

    e2757d60ab3f7e915054c0d0b29e4ccfacd11cec85861925a652df79f6ad467f

  • Size

    824KB

  • Sample

    220521-bmyn3scbc7

  • MD5

    2a61a3772ab2801c2fd03c2eac5e7444

  • SHA1

    725cc9043353eafa328a7f1ce6020a8d9c82b768

  • SHA256

    e2757d60ab3f7e915054c0d0b29e4ccfacd11cec85861925a652df79f6ad467f

  • SHA512

    5c233d95a978e2a9f13c0d72651a4d3e5298c8ecbf487dc805153eca95257303f24afda66dab6d93ad0d15137d5a104e3a4c5c1142491f416bd6b2fafe01aa35

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\3B8E3C2477\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.4.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.50 Location: United States OS: Microsoft Windows 7 Ultimate 64bit CPU: Intel Core Processor (Broadwell) GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 3:48:26 AM MassLogger Started: 5/21/2022 3:47:48 AM Interval: 1 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\New products_Inquiry00000000PDF.scr MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\0F48153F20\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.4.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.51 Location: United States OS: Microsoft Windows 10 Pro64bit CPU: Intel Core Processor (Broadwell) GPU: Microsoft Basic Display Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 1:47:06 AM MassLogger Started: 5/21/2022 1:47:00 AM Interval: 1 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\New products_Inquiry00000000PDF.scr MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.pirc-energy.co.uk
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    [}cHJZymZgEq

Targets

    • Target

      New products_Inquiry00000000PDF.scr

    • Size

      1007KB

    • MD5

      4410f1e9106370721dd61b665e62db98

    • SHA1

      eadff44552f64370b85c35abd736c39465fd833d

    • SHA256

      6d8dbdf39f97cc1b6730d7eb7b2ac7f60ac2026e5ac33edb00093f1a87cfcf9a

    • SHA512

      60ee671e4b37b6cc58ae8bd7351e475f8279827ea7eab30d463e4e201db99b9300b84d21b997ffc029e5cbbb6e4a5efcddb71dceb661a644a4a4227eb3009c67

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks