General

  • Target

    999efe8a7d32764901ed04b7cff249e07ad85ec3e7237e4578f11e9b29de4326.zip

  • Size

    165KB

  • Sample

    231119-zj1w2abd89

  • MD5

    c2ddaed35bfe69f67bc6f919c706ed48

  • SHA1

    a0e6e0ffcbb88a7c7075ec8c81c5f8a6a90b51a1

  • SHA256

    4de17d42d7e83349943d2b73a510ba7bbb37e5def3c5b0342cd2e706b0136990

  • SHA512

    f99404b510d6e2c2f85174309335f7ff23692faed5ee5839d32d35ffa790e12919d9819cc49d981f2af1bb071e22c93b5536feff3bcb6e2beb2eb058090e5950

  • SSDEEP

    3072:+heTCw/WYfxjTpN1ZVCTbMgulNQ1QHE7REbJ9nqA:+hS7znp7OTo7lNaQy4JEA

Malware Config

Extracted

Family

stealc

C2

http://giuliotoro.icu

Attributes
  • url_path

    /40d570f44e84a454.php

rc4.plain

Targets

    • Target

      999efe8a7d32764901ed04b7cff249e07ad85ec3e7237e4578f11e9b29de4326.exe

    • Size

      254KB

    • MD5

      ef45b1ac26f3fb7cac0cf85c568bb881

    • SHA1

      09826670fa495347aec5ba11ca5cf04be417019e

    • SHA256

      999efe8a7d32764901ed04b7cff249e07ad85ec3e7237e4578f11e9b29de4326

    • SHA512

      cfd15c626aece1568311213fcc059ee24e0249f4e343a79b68f1f7b005eeb175b7b1f411b71017b564d3a9f912f9282c81e77be12f62d90d8bdacd4ffc8c826f

    • SSDEEP

      3072:K9xGvZKt0iEfvg6FVs94VIg9EGbJh5j3hKrjRTRS926tyIi/p/4CY/:644tAfvFFi9Tg95hty6926IIiG

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks