General

  • Target

    tmp

  • Size

    238KB

  • Sample

    240104-qtbkfshahk

  • MD5

    9c8286705ed6c40606780a1ee1615462

  • SHA1

    2b93260b475e845f1cf25fb5e0040e7a77a489bf

  • SHA256

    f94a12e629297139c866ad2396dc2d14bfb3f6ec51fcbb723cdb0e2c65e3fbcb

  • SHA512

    4545431c0f086b092716476e601ba89f8dc7767cd437d83b53f264567b01f80916308a02c6092f5fb77d18c62dbb15b5a56e907ac4accb20058b62ce03ca0fda

  • SSDEEP

    3072:z/iLk7we664kHnkEvap5gOMolWNESFYSg9Uv+LQJ6T/ixt7VP:z/iLyiWkES5jKESuB40EH

Malware Config

Extracted

Family

stealc

C2

http://5.42.64.41

Attributes
  • url_path

    /40d570f44e84a454.php

rc4.plain

Targets

    • Target

      tmp

    • Size

      238KB

    • MD5

      9c8286705ed6c40606780a1ee1615462

    • SHA1

      2b93260b475e845f1cf25fb5e0040e7a77a489bf

    • SHA256

      f94a12e629297139c866ad2396dc2d14bfb3f6ec51fcbb723cdb0e2c65e3fbcb

    • SHA512

      4545431c0f086b092716476e601ba89f8dc7767cd437d83b53f264567b01f80916308a02c6092f5fb77d18c62dbb15b5a56e907ac4accb20058b62ce03ca0fda

    • SSDEEP

      3072:z/iLk7we664kHnkEvap5gOMolWNESFYSg9Uv+LQJ6T/ixt7VP:z/iLyiWkES5jKESuB40EH

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks