General

  • Target

    928bcb18852a834c761599967e13f415ea32f5145c709436f0369d292ac509d4

  • Size

    227KB

  • Sample

    231015-1l6qqscd52

  • MD5

    284fe0c51c687b6231da94fc259bebe3

  • SHA1

    129b9b8f5d2d8828537aadf50317feb3b121cdad

  • SHA256

    928bcb18852a834c761599967e13f415ea32f5145c709436f0369d292ac509d4

  • SHA512

    c7e8933e220f7caf9934d13f06d73020c79ce811e8e1531cdd608881afadaa08ede1b4a579d6b5d6ce17708c361a90eb6e60674935a18ae6422be395c72e6f08

  • SSDEEP

    3072:h0TQxc1T89yHJCAIX30SLJjupcUfuoqWtq0/2b8KAbNU7W5UjGxr:KTQx0TbcnnPL9upchFlXbvH

Malware Config

Extracted

Family

stealc

C2

http://elijahdiego.top

Attributes
  • url_path

    /e9c345fc99a4e67e.php

rc4.plain

Targets

    • Target

      928bcb18852a834c761599967e13f415ea32f5145c709436f0369d292ac509d4

    • Size

      227KB

    • MD5

      284fe0c51c687b6231da94fc259bebe3

    • SHA1

      129b9b8f5d2d8828537aadf50317feb3b121cdad

    • SHA256

      928bcb18852a834c761599967e13f415ea32f5145c709436f0369d292ac509d4

    • SHA512

      c7e8933e220f7caf9934d13f06d73020c79ce811e8e1531cdd608881afadaa08ede1b4a579d6b5d6ce17708c361a90eb6e60674935a18ae6422be395c72e6f08

    • SSDEEP

      3072:h0TQxc1T89yHJCAIX30SLJjupcUfuoqWtq0/2b8KAbNU7W5UjGxr:KTQx0TbcnnPL9upchFlXbvH

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks