Masslogger Fileless Variant – Spreads via .VBE, Hides in Registry

June 23, 2025, 7:54 p.m.

Description

A sophisticated variant of the Masslogger credential stealer malware has been identified spreading through .VBE files. This multi-stage fileless malware heavily relies on Windows Registry to store and execute its malicious payload. The infection begins with a .VBE file, likely distributed via spam email or drive-by downloads. The malware sets up registry keys for storing commands, stager configurations, and the final payload. It establishes persistence through a scheduled task and uses techniques to simulate user input. The malware employs multiple stagers to decode and load the final Masslogger payload, which is injected into the AddInProcess32.exe process. The payload targets multiple web browsers and email clients to steal credentials and sensitive information, with capabilities including keylogging, screen capture, and data exfiltration via FTP, SMTP, or Telegram.

Date

  • Created: June 18, 2025, 5:19 p.m.
  • Published: June 18, 2025, 5:19 p.m.
  • Modified: June 23, 2025, 7:54 p.m.

Indicators

  • 0e34c369fc2ab097534feac7983c24c9082ce7e88f600b2f30d377145224cc1d