General

  • Target

    file.exe

  • Size

    234KB

  • Sample

    230930-2h8llahc52

  • MD5

    957d853736cd6c27ab3fa4ed491d1a96

  • SHA1

    db355f36fcda0a3fec9308bd532fc706b80deebe

  • SHA256

    421f7e7128482d501fc4c7d44748061d9572f8a1b053bd07cb5fe16e9dcc4428

  • SHA512

    7ef0d32fa8416197c692c8c73d160f6348bd543e947a172be786faf5beb587c139849cc951a16d44b44589ce2a19bca3da4ad5bc61553ad88068494911fa81eb

  • SSDEEP

    3072:53kEZR5xvQU2uQ/bY8YYlf63NX4OqS5/k16ATO3:5xverUf3KO5dAT

Malware Config

Extracted

Family

stealc

Attributes
  • url_path

    /e9c345fc99a4e67e.php

rc4.plain

Targets

    • Target

      file.exe

    • Size

      234KB

    • MD5

      957d853736cd6c27ab3fa4ed491d1a96

    • SHA1

      db355f36fcda0a3fec9308bd532fc706b80deebe

    • SHA256

      421f7e7128482d501fc4c7d44748061d9572f8a1b053bd07cb5fe16e9dcc4428

    • SHA512

      7ef0d32fa8416197c692c8c73d160f6348bd543e947a172be786faf5beb587c139849cc951a16d44b44589ce2a19bca3da4ad5bc61553ad88068494911fa81eb

    • SSDEEP

      3072:53kEZR5xvQU2uQ/bY8YYlf63NX4OqS5/k16ATO3:5xverUf3KO5dAT

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks