General

  • Target

    ffd7d05ff39fc5e5e74db31cd990a54d8b09e4c45308afdb16d41f86df82ab11

  • Size

    241KB

  • Sample

    240214-fkkfwshf3s

  • MD5

    09fb9b5573daf07188fb4737b642c538

  • SHA1

    9c91eaefc7492a49bdba647fd7e6e45f201524c9

  • SHA256

    ffd7d05ff39fc5e5e74db31cd990a54d8b09e4c45308afdb16d41f86df82ab11

  • SHA512

    959fcd4d2b86dd6fa9bc93f00b11d45634323e2a422fe9fcec2f49e500bc89363b5fb8113a0787fd40277949172e50b6530afc114bec6c7168799deb84b5b394

  • SSDEEP

    6144:XMl8O7Tqtufs+C4WPw93QKwvg6AJ3vc9OVi:XMlx7TqUsn7w93Mvq

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.24

Attributes
  • url_path

    /f993692117a3fda2.php

Targets

    • Target

      ffd7d05ff39fc5e5e74db31cd990a54d8b09e4c45308afdb16d41f86df82ab11

    • Size

      241KB

    • MD5

      09fb9b5573daf07188fb4737b642c538

    • SHA1

      9c91eaefc7492a49bdba647fd7e6e45f201524c9

    • SHA256

      ffd7d05ff39fc5e5e74db31cd990a54d8b09e4c45308afdb16d41f86df82ab11

    • SHA512

      959fcd4d2b86dd6fa9bc93f00b11d45634323e2a422fe9fcec2f49e500bc89363b5fb8113a0787fd40277949172e50b6530afc114bec6c7168799deb84b5b394

    • SSDEEP

      6144:XMl8O7Tqtufs+C4WPw93QKwvg6AJ3vc9OVi:XMlx7TqUsn7w93Mvq

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks