General

  • Target

    89898788b3e29fe9336eb005a461accf.zip

  • Size

    11.2MB

  • Sample

    230630-rgpf8add38

  • MD5

    89898788b3e29fe9336eb005a461accf

  • SHA1

    590583d74f3745a844e8344266127bbadd955e51

  • SHA256

    d044b2e2fa06d26d5feb07c473fc8e185903326c0bc88c96f05d7c62eaba63fe

  • SHA512

    8017169486788282787bf9850991da30da521cc821dc1caed3583afab015d35df918a60258abe3f24eb90ade9ada3f972776e46cf713649e6f9b6ed070dfcd00

  • SSDEEP

    196608:E504QYlYDXrnxQEwdT3bUMY3akRrK/B6na3hMtn8xb9nwXy1ugCyAhLRA:EaQOXmdjo18IQmn8t+sugCphL2

Malware Config

Extracted

Family

stealc

C2

http://172.86.77.102/72cd883ebd748330.php

Targets

    • Target

      ortrainingie64/ortrainingie64.exe

    • Size

      11.3MB

    • MD5

      05270be6cdef9df3f9d5c9919599ac30

    • SHA1

      e8deef7d2d5d62a9e3e17f45508d465cabf607ef

    • SHA256

      f9c0b902d916f689dcf93a3557640741826483e3c2c3139a02605a5ec0546b29

    • SHA512

      841524eecb3397f44f13e4758c07ea87c82744278cd94c3f3e1458926305f3d298385a38d08855124429fbddd4855d9d1fdda492837d93e474930c6c8760a6f8

    • SSDEEP

      196608:WXk6cYbWJrBfhAEwjDLLKU2NCETLKrJSnMzDOhFQDdLLwXg5+gqyQj1d:W0IMrijX+LqAsaFQBA++gq/j1

    • Detects Stealc stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks