General

  • Target

    dbbce2e0a97721f542dcc8f4acf48e867a9896e47ab1e8fa5ad9ede1caab739a

  • Size

    247KB

  • Sample

    231001-2be1pseb7v

  • MD5

    e779e5cb64c80cc368c4f4236cf004da

  • SHA1

    f376b6c29f786c6c4dbcf066696ffd7bafb72daf

  • SHA256

    dbbce2e0a97721f542dcc8f4acf48e867a9896e47ab1e8fa5ad9ede1caab739a

  • SHA512

    6cc3f1076c129280d91750ae4b32483879381e101b32bc8ca172cd6a59acf65789166e6ebd161dc67ec9bdd42067228ea3f27485003e901a8611dc2e5e376349

  • SSDEEP

    3072:6hXjS1NfBEHHKjuJEKeidzxXStOmS6yf5I15V4FkiTC2:6F0oKjuyKwtOmSjyPiT

Malware Config

Extracted

Family

stealc

Attributes
  • url_path

    /e9c345fc99a4e67e.php

rc4.plain

Targets

    • Target

      dbbce2e0a97721f542dcc8f4acf48e867a9896e47ab1e8fa5ad9ede1caab739a

    • Size

      247KB

    • MD5

      e779e5cb64c80cc368c4f4236cf004da

    • SHA1

      f376b6c29f786c6c4dbcf066696ffd7bafb72daf

    • SHA256

      dbbce2e0a97721f542dcc8f4acf48e867a9896e47ab1e8fa5ad9ede1caab739a

    • SHA512

      6cc3f1076c129280d91750ae4b32483879381e101b32bc8ca172cd6a59acf65789166e6ebd161dc67ec9bdd42067228ea3f27485003e901a8611dc2e5e376349

    • SSDEEP

      3072:6hXjS1NfBEHHKjuJEKeidzxXStOmS6yf5I15V4FkiTC2:6F0oKjuyKwtOmSjyPiT

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks