Chinese Threat Actors Infiltrate American ISPs as Part of Cyber Espionage Operation
September 26, 2024CVE-2024-20350 – Cisco Catalyst Center Vulnerability
September 26, 2024Chinese Threat Actors Infiltrate American ISPs as Part of Cyber Espionage Operation
September 26, 2024CVE-2024-20350 – Cisco Catalyst Center Vulnerability
September 26, 2024Severity
High
Analysis Summary
MassLogger, a .NET credential stealer, is a keylogger and stealer malware. MassLogger's prime objective is data extraction or information theft, such as bank account and/or credit card details. This malware was published in April 2020 and was offered for a moderate price on underground forums with a few license choices. It starts with a launcher that employs rudimentary anti-debugging techniques that may be readily bypassed if detected. Eventually, the first stage loader XOR decrypts the second stage assembly, which then decrypts, loads, and executes the final MassLogger payload.
MassLogger targets a wide range of apps to steal login credentials and other sensitive information. It obtains and exfiltrates user credentials from a variety of sources, including Microsoft Outlook, Google Chrome, Mozilla Firefox, and instant messengers.
Impact
- Financial Theft
- Information Theft
Indicators of Compromise
MD5
- 3e2ea8c3f5ca13f16f8ca1c85087f6b6
- b880a95527b907ef9eaa616c97085fef
- 42f2ce52a57e0d72eac297a532354e42
- 2f7386b9d0023122e2499bc02fca0e5a
- 48977f1b641a9a3d88329ac470152381
- 70262b2a7d84c44a127705652cdb57dc
- 942a8123bf0cb7c594bbb09a36d0c893
- b2f6da8ef37102dc99037a24f1aca360
- 0385e6b98ba697152261be7ca7a8d874
- c53b67af325066b418d5acf3e67e93eb
- d0ea74bc92edf6c15ec891218fa6ec82
SHA-256
- 3e0693e5ed5ef3326bd7f6e54db8adc71e28540c2c3e2a60cbf8d1bdb0ff41f3
- aeba922a822e19597e434e9e6ce48037d03fc87e492d1b6f13de50d94baaa515
- 516ffdb4ef149292e235bea6b676674d973e52c3382fdd3c40f85245f9e564ba
- a0a21dd376537c79ac0be99488eef94cf21475cd98de2c6cee0094a8fd52cdc0
- 1c829d80809fb2b5f7c2b40cf05064765bf237f655c9ca557e2d5a01f52b4bc6
- eee5b91e98c90ca0bf35d7e47188214b55387da679bf2821de6446fef111971e
- c4fcfe21455f3aa808eafdc8d0454c72019de3a104e518fc9f059335b4dc6202
- 3526b1e6e62438a0802f50b3c741d5fda79b527005bd59ce5a8d25980aa3975d
- 77656e4337aaa0d3dc57e8f85fa1b10f1eab8445d4fc1eeafa2b1aa6bfbe6cf7
- 18a2d62cc5a151ec2c53c054572a0c762f4f7d6ed600526823a474498942a770
- a947fb714131dc2a3ebdbab989f241713e51d629e00b292b5e6111e8c1506ae3
SHA1
- bc8727f0e142e331b34f01d2dc483da61b24db6b
- 298242fcc01afaadb9fc4340001600d1a3571bfd
- 7f2f1ef38365147865f1cec2c1d0ad62cdc6f7d0
- 2d19fbf3aff8726f81ee3cdd27ce338cf36db816
- d0eb9734f9bdeb6ab50ccad4342f92f4d405d2f0
- 7d23ab78513538d6367f3394cd7471cd68b93b00
- b9cbb2def3503326ad2db1050944571fc73999e4
- 9c7cba453bf47a941fea64708506996c58ce48d8
- f467ab74c025e1e4cdec03a700d911285c9fa0b2
- 8a5b6e006d5a2dc6d18bc679852d4c2e22e6ed9b
- 9e16672d91e4eceb3ceb6c4592baba252ee56edf
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open " links and attachments received from unknown sources/senders.
- Passwords - Ensure that general security policies are employed including implementing strong passwords, correct configurations, and proper administration security policies.
- Admin Access - limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.