General

  • Target

    81be7092464217c3f6d3ad926648b171526288c02ef0414d0f624246418f4fd7

  • Size

    686KB

  • Sample

    220521-xk8bdscaa6

  • MD5

    1c75fe5b6afe6668832594bec20b1ace

  • SHA1

    80e446a034b5f6f93e14e90405417e3f0e448261

  • SHA256

    81be7092464217c3f6d3ad926648b171526288c02ef0414d0f624246418f4fd7

  • SHA512

    7d8a9c5baecf75f92d8c474641bd85475203b77014123c234effa962b2eeeb1ab78620508d8c4255c686f8209e75cef2fb1382f79e950602156e9f8881cc4bad

Malware Config

Targets

    • Target

      RFQ NO. 4400008663.exe

    • Size

      720KB

    • MD5

      dc26f87b2a4b65908a89673d1a4bf4d3

    • SHA1

      fe9c81cafac65c5b78a8b6fd629f7d69ed1f2f05

    • SHA256

      ff6459ca52183c69be1ef1764b9a1cd4c3436d2713483bf5ad219d2bff0d439e

    • SHA512

      3218d19985bd0c4cde21f1bf06d881016e9471c1e9ebe935709e3c493d3c9517a5232d8791152195aff7ab81182efe0434c824b85e364e30a5ffa6a519851b6b

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks