Severity
High
Analysis Summary
MassLogger, a .NET credential stealer, is a keylogger and stealer malware. MassLogger's prime objective is data extraction or information theft, such as bank account and/or credit card details. This malware was published in April 2020 and was offered for a moderate price on underground forums with a few license choices. It starts with a launcher that employs rudimentary anti-debugging techniques that may be readily bypassed if detected. Eventually, the first stage loader XOR decrypts the second stage assembly, which then decrypts, loads, and executes the final MassLogger payload.
MassLogger targets a wide range of apps to steal login credentials and other sensitive information. It obtains and exfiltrates user credentials from a variety of sources, including Microsoft Outlook, Google Chrome, Mozilla Firefox, and instant messengers.
Impact
- Financial Theft
- Information Theft
Indicators of Compromise
MD5
635ded717f98555e086c7f915c298a8f
64d376a01520066305c65b5d3b1c4583
bc23ed4c49d6ed989bfef9908b27e297
9958bb7248ac247180b32ff93968ec5e
54ed828dec29f684fa4a22a883509dce
e49bc5d9f0c14227e85308f1229e431c
SHA-256
2377ee9f6b5250ffee5c9ced5d5f358e98e0a210974decfe447d29ae8e0887b9
5ea192181fcb596b9782457c11433fba5899169e97d7a9b2c0f658407e2ec095
af0ffebfba8d9ae9d2845f680d766590d4170ffe7dc3bbf355072fef2d1028bb
d6f0f38727c762b36df15c44ef60ca77e766fb4f961634b21f4a2c806c481038
6bb586291242c8a75cf42a4d2a8f414a04fcd16ba1e8b730bbf21980600b2bc0
a034122bb42b81cd6a61a4f7bd5040f8ed2ea5e9d7164d4786f52a2a53a77bde
SHA1
db74b3e68c28250b2dc599eb6b9976d455a0ba8a
fb59d74ecc1214685e271e75fbc9e62df3a3398c
275e723068668158017c059157a56ce8e3d59e01
a27f89ddf10c7770878260afc8cc092af3da8b2b
04b235d7e047ffb7bb7b4308541cabb8548570e7
8b344307aa5d0474a77682b76df5bb900ecb1fb4
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open " links and attachments received from unknown sources/senders.
- Ensure that general security policies are employed including implementing strong passwords, correct configurations, and proper administration security policies.
- Limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.

