General

  • Target

    3a47baed5678bc0b96f23641c4bd0ca1585f393979b7dd3072aad6fe03c2a433

  • Size

    1.4MB

  • Sample

    220524-3hl82afecj

  • MD5

    821769527b184bdc553c49a114feae97

  • SHA1

    7363adbd9290aaf84ebbf2dd1a5c0f1b13a01e7c

  • SHA256

    3a47baed5678bc0b96f23641c4bd0ca1585f393979b7dd3072aad6fe03c2a433

  • SHA512

    d660960cca6102686618554197cb9b1f50657f5acff35dbc2fe42a0f05f787ca46d6c1dd27ed158b612d241da54c442c692c0fa39901fd921753fc47b943b992

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\3B8E3C2477\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.5.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.50 Location: United States OS: Microsoft Windows 7 Ultimate 64bit CPU: Intel Core Processor (Broadwell) GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/25/2022 1:35:40 AM MassLogger Started: 5/25/2022 1:35:32 AM Interval: 2 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\3a47baed5678bc0b96f23641c4bd0ca1585f393979b7dd3072aad6fe03c2a433.exe MassLogger Melt: true MassLogger Exit after delivery: false As Administrator: True Processes:

Targets

    • Target

      3a47baed5678bc0b96f23641c4bd0ca1585f393979b7dd3072aad6fe03c2a433

    • Size

      1.4MB

    • MD5

      821769527b184bdc553c49a114feae97

    • SHA1

      7363adbd9290aaf84ebbf2dd1a5c0f1b13a01e7c

    • SHA256

      3a47baed5678bc0b96f23641c4bd0ca1585f393979b7dd3072aad6fe03c2a433

    • SHA512

      d660960cca6102686618554197cb9b1f50657f5acff35dbc2fe42a0f05f787ca46d6c1dd27ed158b612d241da54c442c692c0fa39901fd921753fc47b943b992

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks