General

  • Target

    623e41eaeb69f117691080e4ac4cd1bc.exe

  • Size

    6.6MB

  • Sample

    240113-l1mtvagbdm

  • MD5

    623e41eaeb69f117691080e4ac4cd1bc

  • SHA1

    dd330ae575e184f8955324a9d7c1e572306ae175

  • SHA256

    fdcf2c12cd0e232689188a7826c6a29e1604a5b98a77cb82690b581c049cd983

  • SHA512

    25104b32809f5cbd9ff22a528f77c90540e99e9d5193eba026ea269357f2e6d5b3ae6de0bcdc9be0dee9ee3a092eb909a3f404f74d33c71d0823107f9c206f74

  • SSDEEP

    196608:jBoKvFpMWN59w86tAWGmKCJWd4IZ82mb5p5xsxu+lpf:jBNvF6WN5i86SWGmpsnZMYu+T

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.79

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Targets

    • Target

      623e41eaeb69f117691080e4ac4cd1bc.exe

    • Size

      6.6MB

    • MD5

      623e41eaeb69f117691080e4ac4cd1bc

    • SHA1

      dd330ae575e184f8955324a9d7c1e572306ae175

    • SHA256

      fdcf2c12cd0e232689188a7826c6a29e1604a5b98a77cb82690b581c049cd983

    • SHA512

      25104b32809f5cbd9ff22a528f77c90540e99e9d5193eba026ea269357f2e6d5b3ae6de0bcdc9be0dee9ee3a092eb909a3f404f74d33c71d0823107f9c206f74

    • SSDEEP

      196608:jBoKvFpMWN59w86tAWGmKCJWd4IZ82mb5p5xsxu+lpf:jBNvF6WN5i86SWGmpsnZMYu+T

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks