General

  • Target

    file.exe

  • Size

    5.0MB

  • Sample

    240116-t3s3mseghq

  • MD5

    9fbddfa2696d5061750e6e0ff2162c28

  • SHA1

    a2cc8c949d1404058657ca7fb81854ae092762f3

  • SHA256

    3555805731fe9aeb942a0859e9205481f6367547068658f57ddf38859b8b5cba

  • SHA512

    ea2b807664bc4844ee92f9970ce63a12a98cc42ec23c0f893ef206d09eab9ef6e5b23f36b2671495ee6574e77b0d7cce6503a8950fc48db058037401b1cb068e

  • SSDEEP

    49152:ty/agNoehGYQBcQSiiQMchTQU0Pglz1OCuFTeeoXSS0x1HMToTQFAxTi4I0HQiuq:7CU0Pg91TXKs8Tk4W+f64X

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.79

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Targets

    • Target

      file.exe

    • Size

      5.0MB

    • MD5

      9fbddfa2696d5061750e6e0ff2162c28

    • SHA1

      a2cc8c949d1404058657ca7fb81854ae092762f3

    • SHA256

      3555805731fe9aeb942a0859e9205481f6367547068658f57ddf38859b8b5cba

    • SHA512

      ea2b807664bc4844ee92f9970ce63a12a98cc42ec23c0f893ef206d09eab9ef6e5b23f36b2671495ee6574e77b0d7cce6503a8950fc48db058037401b1cb068e

    • SSDEEP

      49152:ty/agNoehGYQBcQSiiQMchTQU0Pglz1OCuFTeeoXSS0x1HMToTQFAxTi4I0HQiuq:7CU0Pg91TXKs8Tk4W+f64X

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Glupteba

      Glupteba is a modular loader written in Golang with various components.

    • Glupteba payload

    • Stealc

      Stealc is an infostealer written in C++.

    • UAC bypass

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks