General

  • Target

    af8bed3d807b8a292e29402e777ef398f3db6e0d79daca270124f99309252155

  • Size

    229KB

  • Sample

    240204-jkj2xacfc6

  • MD5

    ae574d83589b16904c1c6bea2db3ba43

  • SHA1

    e70cbae9cd2741ab2211f83fe9af3aa37107f7ac

  • SHA256

    af8bed3d807b8a292e29402e777ef398f3db6e0d79daca270124f99309252155

  • SHA512

    65a0c96ecceb09a35730d66f11611b85de78b5935f3e2be2c5f3afa0e99ece308529fa9b47f698893012b08e7bf9ae03fc9d62e572588cc4c02f3257326db4a2

  • SSDEEP

    3072:mGTH9LSPLkeRQaiRtYRTMKVwupI0wYBQA0PUYH5dWX7q35ryx6TVN5:t9LqRQakGPiAB10PUYZd+qy2

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.24

Attributes
  • url_path

    /40d570f44e84a454.php

rc4.plain

Targets

    • Target

      af8bed3d807b8a292e29402e777ef398f3db6e0d79daca270124f99309252155

    • Size

      229KB

    • MD5

      ae574d83589b16904c1c6bea2db3ba43

    • SHA1

      e70cbae9cd2741ab2211f83fe9af3aa37107f7ac

    • SHA256

      af8bed3d807b8a292e29402e777ef398f3db6e0d79daca270124f99309252155

    • SHA512

      65a0c96ecceb09a35730d66f11611b85de78b5935f3e2be2c5f3afa0e99ece308529fa9b47f698893012b08e7bf9ae03fc9d62e572588cc4c02f3257326db4a2

    • SSDEEP

      3072:mGTH9LSPLkeRQaiRtYRTMKVwupI0wYBQA0PUYH5dWX7q35ryx6TVN5:t9LqRQakGPiAB10PUYZd+qy2

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks