General

  • Target

    e60651d8f00042ccc749def941f81d147cf5ced9d146f5f8cb8b2e0a8a070567

  • Size

    519KB

  • Sample

    220521-xkedbabhe8

  • MD5

    404bd184dc75bf742a476b02694d2dfd

  • SHA1

    877d5be53755febc6a5d996d581e56c7325ad23b

  • SHA256

    e60651d8f00042ccc749def941f81d147cf5ced9d146f5f8cb8b2e0a8a070567

  • SHA512

    b7c2c8e84e324dbfbdb7e4de017771606194ec0504ffb43206ef061cbf5cab47f4effd87ee69152d0833c8836a9473d546ffa6bde069f530215f807d81b0c210

Malware Config

Targets

    • Target

      Invoice and Packing export- PDF.exe

    • Size

      882KB

    • MD5

      bdb19770b810cb78953ddb404bae0652

    • SHA1

      49dcad138b9d291b4816e256c5b1fc6f69b03483

    • SHA256

      f9f859554890e30fd306d0df61a182f99e1cb8ff474549bfcede04be41dc93f6

    • SHA512

      bb5c044a82758c655ca3499b97b247c137a769ed4f451661afdc93b4cab492ff07df92cd99079cca6a7abc22caa304799092e8dce5b42137f593dad0a6a423f8

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks