General

  • Target

    SecuriteInfocomWin32RATXg.exe

  • Size

    7.2MB

  • Sample

    230701-jczgmaha7z

  • MD5

    107e19edf19eeab1bcf4278e4c2e6046

  • SHA1

    5a0d934e40701f68942cffaca49d4af14f45943a

  • SHA256

    05999a0d0e1c377026f3b4226305de14445658c1d67a9aea5b893548352fb89e

  • SHA512

    588635b932216cae163fa1c44ac72a4552014827aab6e4eaac63660946716f3bb6074fa1fa72ad78ed390a4a7943a3f4233ca7711f22d111347288ba306eca91

  • SSDEEP

    196608:G0Ndo0wZsyG7tN166wmvNx/A3PLBfTDeLU4o4e:G/nG7tz69Wxo/LJTydo4e

Score
10/10

Malware Config

Extracted

Family

stealc

C2

http://94.130.170.32/7ea86bf53b29dae5.php

Targets

    • Target

      SecuriteInfocomWin32RATXg.exe

    • Size

      7.2MB

    • MD5

      107e19edf19eeab1bcf4278e4c2e6046

    • SHA1

      5a0d934e40701f68942cffaca49d4af14f45943a

    • SHA256

      05999a0d0e1c377026f3b4226305de14445658c1d67a9aea5b893548352fb89e

    • SHA512

      588635b932216cae163fa1c44ac72a4552014827aab6e4eaac63660946716f3bb6074fa1fa72ad78ed390a4a7943a3f4233ca7711f22d111347288ba306eca91

    • SSDEEP

      196608:G0Ndo0wZsyG7tN166wmvNx/A3PLBfTDeLU4o4e:G/nG7tz69Wxo/LJTydo4e

    Score
    10/10
    • Detects Stealc stealer

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks