General

  • Target

    87b115ce75a580734824ac541093c346.bin

  • Size

    140KB

  • Sample

    240101-b2374shdfk

  • MD5

    b38a3f4b54ec16eed038b38acb48c982

  • SHA1

    68fc07a20ce06bd07e324f45352a0af43f4234f9

  • SHA256

    27c67eb6a87e9abc5352741012ed4285f7862344c9b9137021a9355a263deaa9

  • SHA512

    b173c71365e8b1946035c94f70a6d472e679fbb1e9a49eb3b80c36d3572e7ca23c6497c8c7f8f31d855158f84504983b836fbe025e19f54b695a5c3091defe02

  • SSDEEP

    3072:gp4DCDF1r+v2JhCu5cFeK+3r6x7QolpxiQOJ76/H2+Q1AgUYSVezB72KV:yUCDF0+JhCu5cZ+bSMWxiQ86/WLSVMBP

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.79

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Targets

    • Target

      6bd6599cfce9922ac86637ef3080bdabd7e4c4f1c008e3eeeaf81886de4ddb08.exe

    • Size

      202KB

    • MD5

      87b115ce75a580734824ac541093c346

    • SHA1

      9dfda8619af985d07aeacc295228fa956be109de

    • SHA256

      6bd6599cfce9922ac86637ef3080bdabd7e4c4f1c008e3eeeaf81886de4ddb08

    • SHA512

      3a3fd7a987cdc6cf2dbc270c86dfe2e32368c776f58195a6355105f23e1f98b970616c21e0b67187a68300db8cd5169114307f4055c06191560e509e0689082d

    • SSDEEP

      3072:P86vzLETj/f5lZUp2Y9H4WG5GB+FLQF5WE07vrLrOEFtooCk/+R:k6rLETLf5XY9YPMkL0wTHOEqF

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks