General

  • Target

    tmp

  • Size

    238KB

  • Sample

    240202-wfp4kseabn

  • MD5

    14a0bb0b90ac5ca064a42f889dd0492d

  • SHA1

    119a3338e0814e9071b762d8bd5fff6ea2fda28c

  • SHA256

    d0a6076bc23382609a958b7d4d50a54b01d719e24bad56fa10d9da0b083349b6

  • SHA512

    024697eb4e1708781467396169c65e62fef5b8d65b7c1d434d28428ee7adf7628a92c1fe29c856fc1fde443337d2c48fdd42f304b350ee9d550e377e8e7d0a74

  • SSDEEP

    3072:wWTAKLhXk2EzsPq6wP7EQA2OjVNqfBki6mAX7i5HHphJnOJG:kKL9EzsPd8A2DBke0MHtO

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.79

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Targets

    • Target

      tmp

    • Size

      238KB

    • MD5

      14a0bb0b90ac5ca064a42f889dd0492d

    • SHA1

      119a3338e0814e9071b762d8bd5fff6ea2fda28c

    • SHA256

      d0a6076bc23382609a958b7d4d50a54b01d719e24bad56fa10d9da0b083349b6

    • SHA512

      024697eb4e1708781467396169c65e62fef5b8d65b7c1d434d28428ee7adf7628a92c1fe29c856fc1fde443337d2c48fdd42f304b350ee9d550e377e8e7d0a74

    • SSDEEP

      3072:wWTAKLhXk2EzsPq6wP7EQA2OjVNqfBki6mAX7i5HHphJnOJG:kKL9EzsPd8A2DBke0MHtO

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks