General

  • Target

    04ef0a62b8d14320163fa5bd84f000d05cbecffe1f65adfac23db9825c7f10ba

  • Size

    965KB

  • Sample

    220521-pcs8hafae5

  • MD5

    9996c0a8f002d832a13982d98daf3d73

  • SHA1

    f82ed2889df0b08462b1c3a97e34335211db11ca

  • SHA256

    04ef0a62b8d14320163fa5bd84f000d05cbecffe1f65adfac23db9825c7f10ba

  • SHA512

    a0f7b93eaefcedc1de197c6ae5aa75c25ffc3b86768c7c2c99c565c2c1186b048f14dc1efcbf0a9ab334646895434018a30c8369759dc8f5ead56a4a90cbc8ce

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\79FE0CC911\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.5.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.51 Location: United States OS: Microsoft Windows 7 Ultimate 64bit CPU: Intel Core Processor (Broadwell) GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 1:02:53 PM MassLogger Started: 5/21/2022 1:02:42 PM Interval: 2 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\scan00465.pdf.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.saritatravels.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    sumits%$321

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\0F48153F20\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.5.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.51 Location: United States OS: Microsoft Windows 10 Pro64bit CPU: Intel Core Processor (Broadwell) GPU: Microsoft Basic Display Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/21/2022 1:02:37 PM MassLogger Started: 5/21/2022 1:02:34 PM Interval: 2 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\scan00465.pdf.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Targets

    • Target

      scan00465.pdf.exe

    • Size

      1.2MB

    • MD5

      52555fd6673c6f44b7b57d6e1833d1ef

    • SHA1

      6c7dc7a759845917b43da8d5dd73e8f34623adff

    • SHA256

      9ae31235da17306c07a77f94a3541a835f0033df9bc7636a39c984e8cea9e72a

    • SHA512

      a217c4dc99f575c76d3894f2a4e78d810d00a8e5423093c3e9e622b4f94f46261efb74be76278d72c139f0196d20774ecc0ceb2f670768932fcf4e439df38847

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks