LokiBot Malware – Active IOCs
June 7, 2025Lumma Stealer Malware aka LummaC – Active IOCs
June 7, 2025LokiBot Malware – Active IOCs
June 7, 2025Lumma Stealer Malware aka LummaC – Active IOCs
June 7, 2025Severity
High
Analysis Summary
MassLogger, a .NET credential stealer, is a keylogger and stealer malware. MassLogger's prime objective is data extraction or information theft, such as bank account and/or credit card details. This malware was published in April 2020 and was offered for a moderate price on underground forums with a few license choices. It starts with a launcher that employs rudimentary anti-debugging techniques that may be readily bypassed if detected. Eventually, the first stage loader XOR decrypts the second stage assembly, which then decrypts, loads, and executes the final MassLogger payload.
MassLogger targets a wide range of apps to steal login credentials and other sensitive information. It obtains and exfiltrates user credentials from a variety of sources, including Microsoft Outlook, Google Chrome, Mozilla Firefox, and instant messengers.
Impact
- Financial Theft
- Information Theft
Indicators of Compromise
MD5
499297a2d118b642234aae2b12fecacf
e023265d11cdf1ed3e336ea9fc5215b5
a75c4ce4f1e6bea19a6237d0f7db1ff3
SHA-256
6924b42d5d4d864ab365ec7b61078283e1fa5baa7f1ede0be94e2230eb060a77
47a27187c6e5493385de929ef9a55f0be39375e1854cd846ec04f440bcc5ce19
7c4421fa3dc87a87f9ea4141aee3da21374a7b0aa029bdcd49c6b656ec74087d
SHA1
0122ec0ae9b3806db8401af72e44bd55071cb391
273cb0de4246d9844839d6b223d0720ea86b63e6
106e4a55e31a088371731b2c1472c7e6116cabfc
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open " links and attachments received from unknown sources/senders.
- Ensure that general security policies are employed including implementing strong passwords, correct configurations, and proper administration security policies.
- Limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.