Sophisticated BPFDoor Malware Detected Targeting Linux Systems – Active IOCs
April 17, 2025GuLoader Malspam Campaign – Active IOCs
April 18, 2025Sophisticated BPFDoor Malware Detected Targeting Linux Systems – Active IOCs
April 17, 2025GuLoader Malspam Campaign – Active IOCs
April 18, 2025Severity
High
Analysis Summary
MassLogger, a .NET credential stealer, is a keylogger and stealer malware. MassLogger's prime objective is data extraction or information theft, such as bank account and/or credit card details. This malware was published in April 2020 and was offered for a moderate price on underground forums with a few license choices. It starts with a launcher that employs rudimentary anti-debugging techniques that may be readily bypassed if detected. Eventually, the first stage loader XOR decrypts the second stage assembly, which then decrypts, loads, and executes the final MassLogger payload.
MassLogger targets a wide range of apps to steal login credentials and other sensitive information. It obtains and exfiltrates user credentials from a variety of sources, including Microsoft Outlook, Google Chrome, Mozilla Firefox, and instant messengers.
Impact
- Financial Theft
- Information Theft
Indicators of Compromise
MD5
68b98de0c8f993092985b47899b12e2a
569961d587fbe9651fdf78876f30696a
5359499e9f6d130ae33836e5075da0b4
SHA-256
9ec904070458da5e97812b7049393d01ca28fdcffd16e58590e5fff968b4e7f5
2b74988f36ad6ae66a140ee18369c6bf22f2434599ad2f8652fbf725363b47a7
03260ed0ef22a3464f72a8e830d5762a789169557137f598c27cdf6de13d2dda
SHA1
a71da8d9a7a394ed1d0108701e72d5f1cf265aa8
86ca849377d4af23e23418eaa60c19b97b1bed8a
9e370cd9735a285fb1b2314056ab1edefd0c2b20
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open " links and attachments received from unknown sources/senders.
- Ensure that general security policies are employed including implementing strong passwords, correct configurations, and proper administration security policies.
- Limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.