General

  • Target

    b9c81870733125e8ce37bd69ca0dd5fa.bin

  • Size

    140KB

  • Sample

    240108-d5l44sbdg7

  • MD5

    67bab0daa4624aa4d36bb348602abfef

  • SHA1

    b00c7a1cb347b3007fb71557353c53228a072c42

  • SHA256

    69230b88fdebae6ed7cfee6e835bb659e9f197cd1ea7f047e9d951e98c5f9e01

  • SHA512

    dd9a2f3a3ba4b82c80b1ca51c57a1e62b6ed0b650a9c01649717a71a3c2c04384f94259d79b677fdd42f69d85582cd256689f730d5031a965ca938728502ffb0

  • SSDEEP

    3072:0ojjiM+jppy9IXt3AAteW8XZZL9BDcwojdKN1h0NJ:0o7+jpp79AAmXLjg9J

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.79

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Targets

    • Target

      4e90cbff460414a9bd5b8ba2c9680bca2f85d3a38b4d2b2242f8c176d102f72f.exe

    • Size

      202KB

    • MD5

      b9c81870733125e8ce37bd69ca0dd5fa

    • SHA1

      331ce4e42c1f05984d0dfe8def855513f2209711

    • SHA256

      4e90cbff460414a9bd5b8ba2c9680bca2f85d3a38b4d2b2242f8c176d102f72f

    • SHA512

      18678d2cfb07fdd05c50ac41d12d12c5e47cd44d18931ee5c3ba94510093ca155dbda0580df87d03a9885c9c6034a49bc90a9fde73c9a601f48d654db56c0632

    • SSDEEP

      3072:+WKxaOMqLfy1wPgNY01xznuiOsL7dNUUs/VkVbs+5XOORED9:XK/LK2PgTdIsL7/UUkVqy

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks