General

  • Target

    6de33fc0084b434fb9ff8020c55cd080f6535e455e3b41a7ae7d843f410f8521

  • Size

    322KB

  • Sample

    230923-rwce7sab95

  • MD5

    29a8c07e7b0aedf979ccef19cd5e81ce

  • SHA1

    01037b4141dca730c768c652af89beb53152f321

  • SHA256

    6de33fc0084b434fb9ff8020c55cd080f6535e455e3b41a7ae7d843f410f8521

  • SHA512

    3099817d1be50a8ce8c2faf461a131e5de8c98aefcf8617444e98df70ffe0d513a2446913d7bf242e80e4abf4866b8a6e9813a10338b0accf98d05415a6c3ae4

  • SSDEEP

    3072:8IGjsqhP5nkzTGW80/tIoM/oh47emDOzgfkLcrtJ4B:PGjJhhnkzgitId/emDOM2

Malware Config

Extracted

Family

stealc

C2

http://bryanzachary.top

Attributes
  • url_path

    /e9c345fc99a4e67e.php

rc4.plain

Targets

    • Target

      6de33fc0084b434fb9ff8020c55cd080f6535e455e3b41a7ae7d843f410f8521

    • Size

      322KB

    • MD5

      29a8c07e7b0aedf979ccef19cd5e81ce

    • SHA1

      01037b4141dca730c768c652af89beb53152f321

    • SHA256

      6de33fc0084b434fb9ff8020c55cd080f6535e455e3b41a7ae7d843f410f8521

    • SHA512

      3099817d1be50a8ce8c2faf461a131e5de8c98aefcf8617444e98df70ffe0d513a2446913d7bf242e80e4abf4866b8a6e9813a10338b0accf98d05415a6c3ae4

    • SSDEEP

      3072:8IGjsqhP5nkzTGW80/tIoM/oh47emDOzgfkLcrtJ4B:PGjJhhnkzgitId/emDOM2

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks