General

  • Target

    55df033fe62f9b849870c10e28db0432cb4287e278cfc80acc3d113a6887513d

  • Size

    263KB

  • Sample

    231005-avxw3sfg6x

  • MD5

    108f64fe904c91b51067316c572931cb

  • SHA1

    bc545c008063d7deaf0715368d96d904db78c668

  • SHA256

    55df033fe62f9b849870c10e28db0432cb4287e278cfc80acc3d113a6887513d

  • SHA512

    3f4c5c7684275ace512fb217bb4e38dfdc716919b7bd106d6a30e45a68966cc2fd4f84cd2054ee4695e9daad6eb15a67c5d2c435fcef00b959b4f042ae9864b5

  • SSDEEP

    3072:VRmACtZyJtXMBmTEKneNIN2KPOKmgImzG2LAifDX6SKJB0ivcfEg//c851M/Vr:DCmJRM4ruI/hIDPiLKJBv5g/0HV

Malware Config

Extracted

Family

stealc

C2

http://aidandylan.top

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Targets

    • Target

      55df033fe62f9b849870c10e28db0432cb4287e278cfc80acc3d113a6887513d

    • Size

      263KB

    • MD5

      108f64fe904c91b51067316c572931cb

    • SHA1

      bc545c008063d7deaf0715368d96d904db78c668

    • SHA256

      55df033fe62f9b849870c10e28db0432cb4287e278cfc80acc3d113a6887513d

    • SHA512

      3f4c5c7684275ace512fb217bb4e38dfdc716919b7bd106d6a30e45a68966cc2fd4f84cd2054ee4695e9daad6eb15a67c5d2c435fcef00b959b4f042ae9864b5

    • SSDEEP

      3072:VRmACtZyJtXMBmTEKneNIN2KPOKmgImzG2LAifDX6SKJB0ivcfEg//c851M/Vr:DCmJRM4ruI/hIDPiLKJBv5g/0HV

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks