General

  • Target

    file.exe

  • Size

    201KB

  • Sample

    231120-q7h7fsgc83

  • MD5

    85985237380073e38b9572bc47f34392

  • SHA1

    c36ee16ea338b9b1244ce2d39e0e97d714963417

  • SHA256

    6c92d4783045aee396d42a4d9c93d61689d61021d3988b5f12c8ad9f2b0ab233

  • SHA512

    ba9d7579019f243e9e7274b2c5f2e244da51ddfbf784dc51a13dc2fe34924ebf4827545d0747a1ac4fb0a2d0b39b7b1bdc12b2ff3327c0935231eb5012f98149

  • SSDEEP

    3072:VadoYsjQwSmwOkuC/pnVuj8R9T5Ce/N9fcISZyoX6bv:VKIQrm/kuChnVAc9TU6zET6

Malware Config

Extracted

Family

stealc

C2

http://danielhamerling.icu

Attributes
  • url_path

    /40d570f44e84a454.php

rc4.plain

Targets

    • Target

      file.exe

    • Size

      201KB

    • MD5

      85985237380073e38b9572bc47f34392

    • SHA1

      c36ee16ea338b9b1244ce2d39e0e97d714963417

    • SHA256

      6c92d4783045aee396d42a4d9c93d61689d61021d3988b5f12c8ad9f2b0ab233

    • SHA512

      ba9d7579019f243e9e7274b2c5f2e244da51ddfbf784dc51a13dc2fe34924ebf4827545d0747a1ac4fb0a2d0b39b7b1bdc12b2ff3327c0935231eb5012f98149

    • SSDEEP

      3072:VadoYsjQwSmwOkuC/pnVuj8R9T5Ce/N9fcISZyoX6bv:VKIQrm/kuChnVAc9TU6zET6

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks