General

  • Target

    d383b7317144968474ca5318340e6d0e5c47bb2ed95a0ffeb8228d28b3538ca8

  • Size

    198KB

  • Sample

    231001-py8kbacd32

  • MD5

    1f808e080d62acfda4d570fc5bd087e7

  • SHA1

    29c85c2bfadc56c67213f0c88755812479120e97

  • SHA256

    d383b7317144968474ca5318340e6d0e5c47bb2ed95a0ffeb8228d28b3538ca8

  • SHA512

    b0827c3bd2851f73004bd976bda13956d6ddae4206e52170a32a229b0df0823b5092517d3bcec839246828cbc907cd5302f7f3e3fef62c05cc0d37cc911bffcd

  • SSDEEP

    3072:M+Y8WZnbgbWtoslfiNGq8WA/cLIOqjQGjJZ7mb5/3Hl:HGEK+slfzqc/TNjVvEV

Malware Config

Extracted

Family

stealc

Attributes
  • url_path

    /e9c345fc99a4e67e.php

rc4.plain

Targets

    • Target

      d383b7317144968474ca5318340e6d0e5c47bb2ed95a0ffeb8228d28b3538ca8

    • Size

      198KB

    • MD5

      1f808e080d62acfda4d570fc5bd087e7

    • SHA1

      29c85c2bfadc56c67213f0c88755812479120e97

    • SHA256

      d383b7317144968474ca5318340e6d0e5c47bb2ed95a0ffeb8228d28b3538ca8

    • SHA512

      b0827c3bd2851f73004bd976bda13956d6ddae4206e52170a32a229b0df0823b5092517d3bcec839246828cbc907cd5302f7f3e3fef62c05cc0d37cc911bffcd

    • SSDEEP

      3072:M+Y8WZnbgbWtoslfiNGq8WA/cLIOqjQGjJZ7mb5/3Hl:HGEK+slfzqc/TNjVvEV

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks