General

  • Target

    file.exe

  • Size

    208KB

  • Sample

    230920-s22gysbb84

  • MD5

    bc3cbd915ff8541d550a7a389cd7716a

  • SHA1

    db5215e8890f726c7d0688504cc7771c936c18e1

  • SHA256

    c81fa46b63a77fcabb07e917378f7df25757a771ff3d4d3c2f789d17107836b1

  • SHA512

    9e7a4dcfcc11d84059c02972f1cba2ac892f2f49d546d6fe2a13b55f0d232090702d88acb21004b11568892024ee4a12db3f4623a00b47d1814fc1abbfadea8f

  • SSDEEP

    3072:JXtSanqKBzFBjlMqZNARKo1cDEDg0kseF3l5JgU3Tog:twgnBzF4q/41UcgseFhgU3TF

Malware Config

Extracted

Family

stealc

C2

http://bryanzachary.top

Attributes
  • url_path

    /e9c345fc99a4e67e.php

rc4.plain

Targets

    • Target

      file.exe

    • Size

      208KB

    • MD5

      bc3cbd915ff8541d550a7a389cd7716a

    • SHA1

      db5215e8890f726c7d0688504cc7771c936c18e1

    • SHA256

      c81fa46b63a77fcabb07e917378f7df25757a771ff3d4d3c2f789d17107836b1

    • SHA512

      9e7a4dcfcc11d84059c02972f1cba2ac892f2f49d546d6fe2a13b55f0d232090702d88acb21004b11568892024ee4a12db3f4623a00b47d1814fc1abbfadea8f

    • SSDEEP

      3072:JXtSanqKBzFBjlMqZNARKo1cDEDg0kseF3l5JgU3Tog:twgnBzF4q/41UcgseFhgU3TF

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks