General

  • Target

    ea1d486ee6b3c2dd96db4f2bc1236f4c40d2b7d3a8a060f3348fab00c98832db

  • Size

    813KB

  • Sample

    220521-ngz16sghbk

  • MD5

    cac3a043c324c1a1edadca21182da675

  • SHA1

    8387a44e38af3ce832e1d7a20159596d80d43124

  • SHA256

    ea1d486ee6b3c2dd96db4f2bc1236f4c40d2b7d3a8a060f3348fab00c98832db

  • SHA512

    1e0009e99422c14628df2ff737fd7f2c497a6841625ed32be60d13bd3b5afd34c3cf2d9f72f5f7143c08131b6ab7b76ba4068a276753502df7b2ef732f8acdd3

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\79FE0CC911\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.7.1 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.51 Location: United States Windows OS: Microsoft Windows 7 Ultimate 64bit Windows Serial Key: D4F6K-QK3RD-TMVMJ-BBMRX-3MBMV CPU: Intel Core Processor (Broadwell) GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 11:42:55 AM MassLogger Started: 5/21/2022 11:42:44 AM Interval: 2 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\Purchase Order_pdf.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\F95B724EDE\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.7.1 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.50 Location: United States Windows OS: Microsoft Windows 10 Pro64bit Windows Serial Key: W269N-WFGWX-YVC9B-4J6C9-T83GX CPU: Intel Core Processor (Broadwell) GPU: Microsoft Basic Display Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 1:43:55 PM MassLogger Started: 5/21/2022 1:43:51 PM Interval: 2 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\Purchase Order_pdf.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Targets

    • Target

      Purchase Order_pdf.exe

    • Size

      863KB

    • MD5

      46f6a9c3798b0a265c883914b575f582

    • SHA1

      ee1ef2e31b27385fe7c419051764c3b7c1872c78

    • SHA256

      7c8962ad0cf0487df0793c34b8bba9b9fbb83e88287afa9761083e3d7b4eda36

    • SHA512

      50a645aaeb3cb5582f12a2f917d939602dc20e3a2020af19b13d1253325f8df45072fd9b184c64870b1a42a8ecbcc8ee6b09ed01b489912e5635d899ad1ee21a

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks