General

  • Target

    SecuriteInfo.com.Win32.BotX-gen.913.6701.exe

  • Size

    280KB

  • Sample

    231107-3fefeaaa9v

  • MD5

    76daa31971d419f322850907a79a8f94

  • SHA1

    3a141ccc0de5300dfa1c08157a99c21b6e17fa32

  • SHA256

    0a63b532f4d9a86b6a8fffdf7ada2459bb0c06dd5d13ff045aa196d888f803c7

  • SHA512

    917eef1ab48a8cd2021e56a3f113491923c4204129d82ecc3344c952785d0b0cacdaeec7bb3190adcf4b21d24ecdf08d8698abad87ee494eae7fa6c1777e6d44

  • SSDEEP

    3072:rBlXBvsEDLf1+6vL7OjQK+cE6hG/CLfNI7E+d27vfrhpoAlSJli:Jvsm9+6vLuQK+4hG/qfN5vfdp74

Malware Config

Extracted

Family

stealc

C2

http://raymonddixon.icu

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Targets

    • Target

      SecuriteInfo.com.Win32.BotX-gen.913.6701.exe

    • Size

      280KB

    • MD5

      76daa31971d419f322850907a79a8f94

    • SHA1

      3a141ccc0de5300dfa1c08157a99c21b6e17fa32

    • SHA256

      0a63b532f4d9a86b6a8fffdf7ada2459bb0c06dd5d13ff045aa196d888f803c7

    • SHA512

      917eef1ab48a8cd2021e56a3f113491923c4204129d82ecc3344c952785d0b0cacdaeec7bb3190adcf4b21d24ecdf08d8698abad87ee494eae7fa6c1777e6d44

    • SSDEEP

      3072:rBlXBvsEDLf1+6vL7OjQK+cE6hG/CLfNI7E+d27vfrhpoAlSJli:Jvsm9+6vLuQK+4hG/qfN5vfdp74

    • Buer

      Buer is a new modular loader first seen in August 2019.

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks