General

  • Target

    cc72bc96a5ff9ab174ae322f904e49e91a3feaeff26b4e1d86c071603aeebee3

  • Size

    250KB

  • Sample

    231103-zadedahh9w

  • MD5

    4b5defbc06db301ec6fa4dbd0656cf10

  • SHA1

    502ae7d7720b50c2221b1c38f9f880c818afd0ee

  • SHA256

    cc72bc96a5ff9ab174ae322f904e49e91a3feaeff26b4e1d86c071603aeebee3

  • SHA512

    db9d867f474da8667d7405e35d90e4011625ee106b659a34c75dbbedd40e5f983b78e7b817ad50c5b375ab069107d74886e9b76b28fe768c1f29f4142cf4670d

  • SSDEEP

    3072:exWZZoM3QxDDSeXoOYyloZsSRs8kBlKMe0054SPLJLrY9+H6u:NoM3QxVXoVyksSRdL00ySPV/

Malware Config

Extracted

Family

stealc

C2

http://williammoore.top

Attributes
  • url_path

    /40d570f44e84a454.php

rc4.plain

Targets

    • Target

      cc72bc96a5ff9ab174ae322f904e49e91a3feaeff26b4e1d86c071603aeebee3

    • Size

      250KB

    • MD5

      4b5defbc06db301ec6fa4dbd0656cf10

    • SHA1

      502ae7d7720b50c2221b1c38f9f880c818afd0ee

    • SHA256

      cc72bc96a5ff9ab174ae322f904e49e91a3feaeff26b4e1d86c071603aeebee3

    • SHA512

      db9d867f474da8667d7405e35d90e4011625ee106b659a34c75dbbedd40e5f983b78e7b817ad50c5b375ab069107d74886e9b76b28fe768c1f29f4142cf4670d

    • SSDEEP

      3072:exWZZoM3QxDDSeXoOYyloZsSRs8kBlKMe0054SPLJLrY9+H6u:NoM3QxVXoVyksSRdL00ySPV/

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks