MassLogger was first reported in late April or early May. It is a modular keylogger and infostealer that researchers describes as having more features than other similar malware. Its features include the ability to spread itself by infecting inserted USB storage devices, anti-VM techniques, and the ability to exclude itself from Windows Defender checks. It is being distributed in malspam campaigns that mainly use various types of archive files or documents attached to the emails. The malicious documents use VisualBasic macros and include an exploit for the Equation Editor vulnerability (CVE-2017-11882) in MS Office, which was patched in November 2017. The payload is downloaded from a remote source. When the infection vector is an archive file, the payload is obfuscated and contained within the archive. MassLogger will attempt to obtain user data from a number of applications including Discord, Chromium Recovery, FileZilla, FireFox, Foxmail, NordVPN, Outlook, Pidgin, QQ, Telegram, and Thunderbird. Keystrokes are logged and other information is obtained, all of which is sent to the C&C server. Persistence is achieved through the creation of scheduled tasks.