General

  • Target

    207754fa192fc1e34e26662a24f08a93975e57e7080ca9e2059a593b45d82732

  • Size

    268KB

  • Sample

    231115-yek5caeh3s

  • MD5

    a261ee77f16d1ca322ccdc1006599ffc

  • SHA1

    8d2748a5c5b82b0bc7c1c034dd1e2ac759c95901

  • SHA256

    207754fa192fc1e34e26662a24f08a93975e57e7080ca9e2059a593b45d82732

  • SHA512

    b8fb3b88e7d035bea648f85505e0f67ca10d5399fbbb72fdb0999e7a902de5a9f401d9f7f3284e1f41431071151054d904c4c877ce6035ef79e1ed6238a58c0b

  • SSDEEP

    3072:SyN5fGLjJ5cdzt+Wl/kVPAhInWEGreacmnmZ3JyJ+LR2MOKTYzbck9CRL:yLjJ5c9tdMPAhcnacmnmxQ/M8b

Malware Config

Extracted

Family

stealc

C2

http://bernardofata.icu

Attributes
  • url_path

    /40d570f44e84a454.php

rc4.plain

Targets

    • Target

      207754fa192fc1e34e26662a24f08a93975e57e7080ca9e2059a593b45d82732

    • Size

      268KB

    • MD5

      a261ee77f16d1ca322ccdc1006599ffc

    • SHA1

      8d2748a5c5b82b0bc7c1c034dd1e2ac759c95901

    • SHA256

      207754fa192fc1e34e26662a24f08a93975e57e7080ca9e2059a593b45d82732

    • SHA512

      b8fb3b88e7d035bea648f85505e0f67ca10d5399fbbb72fdb0999e7a902de5a9f401d9f7f3284e1f41431071151054d904c4c877ce6035ef79e1ed6238a58c0b

    • SSDEEP

      3072:SyN5fGLjJ5cdzt+Wl/kVPAhInWEGreacmnmZ3JyJ+LR2MOKTYzbck9CRL:yLjJ5c9tdMPAhcnacmnmxQ/M8b

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks