General

  • Target

    1c93b99d8e1968867508692feb30aa67c0a48a2a623704f982d1dd9754125ace

  • Size

    264KB

  • Sample

    231117-hff9saga78

  • MD5

    d3f6d40bca88051421668bd295322894

  • SHA1

    5bd5d07a1d69297ace31b8851168282f99d6becb

  • SHA256

    1c93b99d8e1968867508692feb30aa67c0a48a2a623704f982d1dd9754125ace

  • SHA512

    2e940c6881e6709c040a28c6b293302b48457955d71ae27180ea9e8326e302493f2adad77a83405d35ed30ea2dd20dc208217e6a654aa361f3844caee3db1c1b

  • SSDEEP

    3072:WA/kRL2i1bPY5+FYGvdktSdNAaH2YVlFJqZDClXRtd3FeJ21ls/zvl:3kRL2ODYcfkMvz7xhde

Malware Config

Extracted

Family

stealc

C2

http://bernardofata.icu

Attributes
  • url_path

    /40d570f44e84a454.php

rc4.plain

Targets

    • Target

      1c93b99d8e1968867508692feb30aa67c0a48a2a623704f982d1dd9754125ace

    • Size

      264KB

    • MD5

      d3f6d40bca88051421668bd295322894

    • SHA1

      5bd5d07a1d69297ace31b8851168282f99d6becb

    • SHA256

      1c93b99d8e1968867508692feb30aa67c0a48a2a623704f982d1dd9754125ace

    • SHA512

      2e940c6881e6709c040a28c6b293302b48457955d71ae27180ea9e8326e302493f2adad77a83405d35ed30ea2dd20dc208217e6a654aa361f3844caee3db1c1b

    • SSDEEP

      3072:WA/kRL2i1bPY5+FYGvdktSdNAaH2YVlFJqZDClXRtd3FeJ21ls/zvl:3kRL2ODYcfkMvz7xhde

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks