General

  • Target

    8eb48dc7cab80734e38199367de43421aebe7c92e036e056c9f7ce69378eef43

  • Size

    835KB

  • Sample

    220521-n15e1ahfaq

  • MD5

    1b0410371ef6b8fa294ab12e2ed92028

  • SHA1

    5cc0989071f6c3ab2ed1b8c4052b0d38b8a2cc55

  • SHA256

    8eb48dc7cab80734e38199367de43421aebe7c92e036e056c9f7ce69378eef43

  • SHA512

    cd24b756ea1e7d6a96b49b75bf600147f05e414a9fe2be858f303674575b490e2898cacf829b358f1da5a7e26ca7f79b5b9c3dfdc725255cfad08e13715284a6

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.7.1 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.50 Location: United States Windows OS: Microsoft Windows 7 Ultimate 64bit Windows Serial Key: D4F6K-QK3RD-TMVMJ-BBMRX-3MBMV CPU: Intel Core Processor (Broadwell) GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 1:59:29 PM MassLogger Started: 5/21/2022 1:59:22 PM Interval: 1 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\ttttttt.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Targets

    • Target

      ttttttt.exe

    • Size

      1.3MB

    • MD5

      5871c56853982658b13619b6beae47da

    • SHA1

      f2dbb57a824853f48a6b16797e9682b328078b93

    • SHA256

      296b2d6c24dd68f7a59ea4388d979bba6572c288ab891cd35ec81e56c602318d

    • SHA512

      5cc16a8c7a76320927f3818845929fe42583a0f6151144e81d2a6afb0d86a6ea3c65efaa6efd54f6b5f40dd5f1d33bf0638089516d75c2819cb8ae4c7606edd1

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks