General

  • Target

    04da986140a9a006f9d616b2a796d30b0a04048e78e1c8a66b57be87d99bf984

  • Size

    813KB

  • Sample

    220521-d4w8paggh5

  • MD5

    e764970ec270974b46439bbb79528589

  • SHA1

    1856e084911ce9a56507c127d7df2108151f23f2

  • SHA256

    04da986140a9a006f9d616b2a796d30b0a04048e78e1c8a66b57be87d99bf984

  • SHA512

    32815067200478fd3473c795a819be9504589b24cbf26ccd92b06bcab6f578a0ac79b8282cc2c18f867812127c503887161d12e5f7384d8799ec807e2844737a

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.privateemail.com
  • Port:
    587
  • Username:
    eurotoolz@returntolz.com
  • Password:
    Protected@123

Targets

    • Target

      Alfa Bank 052020.pif

    • Size

      912KB

    • MD5

      84944bb019baca46b4a6e8beada5b97d

    • SHA1

      6f7ff04ddbacea914bc620e0bcb55f8809db674a

    • SHA256

      d9a20b5a29f7c7a81854af1fb1dfe50dc63ec6026d07d271b1d3be30b061ca0f

    • SHA512

      d375bc4e98153edf4b7799ba90d03ea425357ee2a043b7f883d19ce2cb4e1dc21fff501b355d4ca1ee70a357209e0ef505f2f7958dc87b07d94dd23df6be7ca2

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks