General

  • Target

    2d246c826a531df1cbc2225914fc8d891a6b9ce6d5eab5f7c03891ebf67ce421

  • Size

    944KB

  • Sample

    220521-xkbmesbhe2

  • MD5

    f3fefa4903d11b5777cdda4c5fd76b83

  • SHA1

    b47c757b7a576deb85f4ef313f08ec111dbda95b

  • SHA256

    2d246c826a531df1cbc2225914fc8d891a6b9ce6d5eab5f7c03891ebf67ce421

  • SHA512

    3a1524c504b70a394b7787aabd0d925971aeacd2090b52e9f04cd23d4ec30839fd077a4bb24a51c2bbf033d208ba72705a0541315b4c2c37383b79edf0f7e545

Malware Config

Targets

    • Target

      Invoice and Packing export- PDF.exe

    • Size

      882KB

    • MD5

      bdb19770b810cb78953ddb404bae0652

    • SHA1

      49dcad138b9d291b4816e256c5b1fc6f69b03483

    • SHA256

      f9f859554890e30fd306d0df61a182f99e1cb8ff474549bfcede04be41dc93f6

    • SHA512

      bb5c044a82758c655ca3499b97b247c137a769ed4f451661afdc93b4cab492ff07df92cd99079cca6a7abc22caa304799092e8dce5b42137f593dad0a6a423f8

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks