General

  • Target

    f9f859554890e30fd306d0df61a182f99e1cb8ff474549bfcede04be41dc93f6

  • Size

    882KB

  • Sample

    220521-xj9g3afbfq

  • MD5

    bdb19770b810cb78953ddb404bae0652

  • SHA1

    49dcad138b9d291b4816e256c5b1fc6f69b03483

  • SHA256

    f9f859554890e30fd306d0df61a182f99e1cb8ff474549bfcede04be41dc93f6

  • SHA512

    bb5c044a82758c655ca3499b97b247c137a769ed4f451661afdc93b4cab492ff07df92cd99079cca6a7abc22caa304799092e8dce5b42137f593dad0a6a423f8

Malware Config

Targets

    • Target

      f9f859554890e30fd306d0df61a182f99e1cb8ff474549bfcede04be41dc93f6

    • Size

      882KB

    • MD5

      bdb19770b810cb78953ddb404bae0652

    • SHA1

      49dcad138b9d291b4816e256c5b1fc6f69b03483

    • SHA256

      f9f859554890e30fd306d0df61a182f99e1cb8ff474549bfcede04be41dc93f6

    • SHA512

      bb5c044a82758c655ca3499b97b247c137a769ed4f451661afdc93b4cab492ff07df92cd99079cca6a7abc22caa304799092e8dce5b42137f593dad0a6a423f8

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks