General

  • Target

    f49a52f841c0947006b687698efd2349648fb3c5aea51fbfaa099b5a5ab30463

  • Size

    811KB

  • Sample

    220524-z85xaageg9

  • MD5

    41edb90d4d8c3c20a2d0536df9b4f8f2

  • SHA1

    16c20324da04c5e99230a5c39efc96714340ce18

  • SHA256

    f49a52f841c0947006b687698efd2349648fb3c5aea51fbfaa099b5a5ab30463

  • SHA512

    156abdca72e5552af5c2bfab84d0e1cf0cd7b39bb4335937784d382fff0576e08ef92b267b01d3507ef940bfe02decaad22c07eefb6c2a49a06b06a473b792e9

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\AEF946DCB4\Log.txt

Family

masslogger

Ransom Note
################################################################# MassLogger v1.3.4.0 ################################################################# ### Logger Details ### User Name: Admin IP: 154.61.71.50 Location: United States OS: Microsoft Windows 7 Ultimate 64bit CPU: Intel Core Processor (Broadwell) GPU: Standard VGA Graphics Adapter AV: NA Screen Resolution: 1280x720 Current Time: 5/24/2022 11:26:02 PM MassLogger Started: 5/24/2022 11:25:51 PM Interval: 2 hour MassLogger Process: C:\Users\Admin\AppData\Local\Temp\Agency Fund JUNE20_Revised.exe MassLogger Melt: false MassLogger Exit after delivery: false As Administrator: True Processes:

Targets

    • Target

      Agency Fund JUNE20_Revised.exe

    • Size

      948KB

    • MD5

      cfdd2d3dc883211f7a6f934e4b295714

    • SHA1

      e7deccd6d0685263d69a4cdff890baa0865770b1

    • SHA256

      98ec6884be9b64e2e37a37460bd3d8ca770f2ef2d1d5cd4b6321a01462c8d32b

    • SHA512

      b14684e7d37c884eb2da0066ddf694360a56f279be55f8335985c0a82882b54f39f42e4fd991e77f5e394d6f29b386194365003c6dd048c6d5ed87c2172073a7

    • MassLogger

      Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

    • MassLogger Main Payload

    • MassLogger log file

      Detects a log file produced by MassLogger.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks