General

  • Target

    b96cfbc6878aabb8d480b165c2576c68af6807c8b80bc80810effd84be7f08e7

  • Size

    638KB

  • Sample

    220521-cpmv2ahcfm

  • MD5

    c0208c4dee22456b9a4f6db10918edfc

  • SHA1

    b6e9e05180bf435bee9d3f1b77852ab0feb2fc94

  • SHA256

    b96cfbc6878aabb8d480b165c2576c68af6807c8b80bc80810effd84be7f08e7

  • SHA512

    3a818e237260912c50c0ae9ee77976fe778b11d4a5859eca62381e34ee796729a3d6eec492a9511223552220ec27816755093c80d8b1e52b6e1b870f926934c0

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\8506BBE7FF\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v2.0.0.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.13 Location: United States Windows OS: Microsoft Windows 7 Ultimate 64bit Windows Serial Key: D4F6K-QK3RD-TMVMJ-BBMRX-3MBMV CPU: Intel Core Processor (Broadwell) GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 5:22:03 AM MassLogger Started: 5/21/2022 5:21:54 AM Interval: 2 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\DEBIT SLIP.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Targets

    • Target

      DEBIT SLIP.exe

    • Size

      775KB

    • MD5

      0c745a8bed9b15ae636a3a4cdfd1ebb0

    • SHA1

      83789dd42bea9365cfa0c9b3498e4ce0c2c9808a

    • SHA256

      192896dbc7744f51c63044f4bf8a0fd260cc73ddcc84200161ce45b81c7e9e50

    • SHA512

      0de3f1227abb606d1e754499450acdd44565f52afed5e73bbc6078018b374e4081fa072acb9856f7de17a91ebe21ea916ad519cd8be1cef650e702c764921949

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Modifies visibility of file extensions in Explorer

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Hidden Files and Directories

1
T1158

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

1
T1112

Virtualization/Sandbox Evasion

2
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks