Rewterz Threat Advisory – CVE-2020-16166 – Linux Kernel network RNG information disclosure
August 3, 2020Rewterz Threat Advisory – CVE-2020-14496 – ICS: Mitsubishi Electric Multiple Factory Automation Engineering Software Products
August 4, 2020Rewterz Threat Advisory – CVE-2020-16166 – Linux Kernel network RNG information disclosure
August 3, 2020Rewterz Threat Advisory – CVE-2020-14496 – ICS: Mitsubishi Electric Multiple Factory Automation Engineering Software Products
August 4, 2020Severity
Medium
Analysis Summary
MassLogger was first reported in late April or early May. It is a modular keylogger and infostealer that researchers describes as having more features than other similar malware. Its features include the ability to spread itself by infecting inserted USB storage devices, anti-VM techniques, and the ability to exclude itself from Windows Defender checks. It is being distributed in malspam campaigns that mainly use various types of archive files or documents attached to the emails. The malicious documents use VisualBasic macros and include an exploit for the Equation Editor vulnerability (CVE-2017-11882) in MS Office, which was patched in November 2017. The payload is downloaded from a remote source. When the infection vector is an archive file, the payload is obfuscated and contained within the archive. MassLogger will attempt to obtain user data from a number of applications including Discord, Chromium Recovery, FileZilla, FireFox, Foxmail, NordVPN, Outlook, Pidgin, QQ, Telegram, and Thunderbird. Keystrokes are logged and other information is obtained, all of which is sent to the C&C server. Persistence is achieved through the creation of scheduled tasks.
Impact
- Information stealer
- Keylogging
Indicators of Compromise
MD5
- d1fff0c0782d08ed17387297369797e0
- 31b65a54940b164d502754b09e3e9b63
SHA-256
- 7fa391d30bb55c4fcb4f7a43648e4373b0949e5579bfc45a7e611c352590d5f0
- 19fa83b7bae45345ba8ecf08b8ec7bbf6c925ff1a10f9730742b1dcf77cced23
SHA1
- f63576579404338d80a37ba8e553970fe178e823
- 6fdacc0d93962d3d5c21f682c6a40ef320d11936
Remediation
- Block all threat indicators at your respective controls.
- Search for IOCs in your environment.