General

  • Target

    5180d3ba800c5ae596b6043eb902ea166e3a367f569ee4050008562e70a492c3

  • Size

    218KB

  • Sample

    231113-tszsfadg6y

  • MD5

    a9c5762d4f2c58ecce540e4008a6c0c1

  • SHA1

    5ab49c6de999946070285225c213ca525410f83e

  • SHA256

    5180d3ba800c5ae596b6043eb902ea166e3a367f569ee4050008562e70a492c3

  • SHA512

    5685192d37ec3c118ec884e1ca8fb9680d8b6f7aae93c587b202d7ede64454dd16caa32dd7cd048fe43b6501383241ea72505300c359c43f9ac717d8d54e26cd

  • SSDEEP

    3072:5WoNYO8kFLZP4Zjh9EUH4hi9JPFWgHQM48qJhZZP8um6G1SxOsUHTt0rvqbfGE:RNY8FLZPcEeJbHHm53P8umgEHx0+jX

Malware Config

Extracted

Family

stealc

C2

http://bernardofata.icu

Attributes
  • url_path

    /40d570f44e84a454.php

rc4.plain

Targets

    • Target

      5180d3ba800c5ae596b6043eb902ea166e3a367f569ee4050008562e70a492c3

    • Size

      218KB

    • MD5

      a9c5762d4f2c58ecce540e4008a6c0c1

    • SHA1

      5ab49c6de999946070285225c213ca525410f83e

    • SHA256

      5180d3ba800c5ae596b6043eb902ea166e3a367f569ee4050008562e70a492c3

    • SHA512

      5685192d37ec3c118ec884e1ca8fb9680d8b6f7aae93c587b202d7ede64454dd16caa32dd7cd048fe43b6501383241ea72505300c359c43f9ac717d8d54e26cd

    • SSDEEP

      3072:5WoNYO8kFLZP4Zjh9EUH4hi9JPFWgHQM48qJhZZP8um6G1SxOsUHTt0rvqbfGE:RNY8FLZPcEeJbHHm53P8umgEHx0+jX

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks