General

  • Target

    8d48255ac20f28b94dfbbbd78883aea5.bin

  • Size

    138KB

  • Sample

    230923-cq2etade97

  • MD5

    9f95b11eda888160fcc46bbae459ba22

  • SHA1

    18f89bdef20438788415ccf18b88b06cce404dc8

  • SHA256

    8d26f62e9d6d15ef5c30018d57b535942a52e0e3475bfd95a4eaca65a0c933b7

  • SHA512

    a9a1cfa26aefe0d2f61072d1338adcdb3ecf3c38c655a5cbd7e892f7792f8c06bf0ada4caab11080af176bae971ca478eb4ce2795330c0e27c75ab05f69649d8

  • SSDEEP

    3072:V2O75fj6FSykxtphtE6BgQKpe2ODZwGLqBg/FZ0uNwF:nFeApXZM9wcg/FZqF

Malware Config

Extracted

Family

stealc

C2

http://bryanzachary.top

Attributes
  • url_path

    /e9c345fc99a4e67e.php

rc4.plain

Targets

    • Target

      f5748244010e9e8c2cf4da8d7916c12b1bc808003d7f9e46da0e2adc85edf90a.exe

    • Size

      293KB

    • MD5

      8d48255ac20f28b94dfbbbd78883aea5

    • SHA1

      89844c5bc949015b9c8d2e74c07085dafc03fc0b

    • SHA256

      f5748244010e9e8c2cf4da8d7916c12b1bc808003d7f9e46da0e2adc85edf90a

    • SHA512

      76184e1730c94e58eccf13df6012611d844e904fcb8b8013484c7c8cae9d19cb855b5f92bc05b00c77cefa5c678768b540126fef4c2c795328e4591557da9db2

    • SSDEEP

      3072:lonX/pzSGvDXvnxfvlQ99XJIWC0aN+sS0f0vgNIEg6TArwg85ve:6X/ZSIPxfS/ZIXG0f0v6TAsg8F

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks