General

  • Target

    file.exe

  • Size

    254KB

  • Sample

    231022-sn1y9saa9t

  • MD5

    4e394b1a68dc5009383320218d1d9366

  • SHA1

    b7e27e16892424388ed7875c25aa33cc36194047

  • SHA256

    0d36b22f0a5a966b9f89c9fa9ad0e740e5c636560eafaf887e74d708f3f81bdf

  • SHA512

    62c637d45a13ac59879a775ea66d410eb3c3e15a1b268003f723d1e840ff33b9566fb582aebe637c7362907d4debf45d67e5d9c4a430343ee19a057c7b81155c

  • SSDEEP

    3072:xyBNUfBKxAtGdKP3IH9q6+JOkoo83SNLJTk56CKoeSUnvQX:seMAt6KP4Hb+JOkT8CNKHN

Malware Config

Extracted

Family

stealc

C2

http://wy�ttsebastian.top

Attributes
  • url_path

    /e9c345fc99a4e67e.php

rc4.plain

Targets

    • Target

      file.exe

    • Size

      254KB

    • MD5

      4e394b1a68dc5009383320218d1d9366

    • SHA1

      b7e27e16892424388ed7875c25aa33cc36194047

    • SHA256

      0d36b22f0a5a966b9f89c9fa9ad0e740e5c636560eafaf887e74d708f3f81bdf

    • SHA512

      62c637d45a13ac59879a775ea66d410eb3c3e15a1b268003f723d1e840ff33b9566fb582aebe637c7362907d4debf45d67e5d9c4a430343ee19a057c7b81155c

    • SSDEEP

      3072:xyBNUfBKxAtGdKP3IH9q6+JOkoo83SNLJTk56CKoeSUnvQX:seMAt6KP4Hb+JOkT8CNKHN

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks