General

  • Target

    02cb9af88746226616ddb11daa71c69b905d058821024b33312f89280d801b20

  • Size

    257KB

  • Sample

    240214-qnl41abf71

  • MD5

    79354d807b84eae0226cb281d51ec556

  • SHA1

    1f3b8c2cc5cb2a5ba43928bbdf69da68f7d53699

  • SHA256

    02cb9af88746226616ddb11daa71c69b905d058821024b33312f89280d801b20

  • SHA512

    b7afe17aec21af193f510f77cc64fdc9384660e39c461e9d190dc75d2056cad7782ac190ed340dd72b3d8254bbc5b4b84e248f4b18b36a4c2acdcd5c44373a3d

  • SSDEEP

    3072:ri1a+Cho8bykoRlY0j+rkzErS1qgiKSYOChEzg1rrsfHEyrUx4zXn4nYI5UXn7t7:rp3a8MdjHzXiKSuGzg1rrl04i3V

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.24

Attributes
  • url_path

    /f993692117a3fda2.php

Targets

    • Target

      02cb9af88746226616ddb11daa71c69b905d058821024b33312f89280d801b20

    • Size

      257KB

    • MD5

      79354d807b84eae0226cb281d51ec556

    • SHA1

      1f3b8c2cc5cb2a5ba43928bbdf69da68f7d53699

    • SHA256

      02cb9af88746226616ddb11daa71c69b905d058821024b33312f89280d801b20

    • SHA512

      b7afe17aec21af193f510f77cc64fdc9384660e39c461e9d190dc75d2056cad7782ac190ed340dd72b3d8254bbc5b4b84e248f4b18b36a4c2acdcd5c44373a3d

    • SSDEEP

      3072:ri1a+Cho8bykoRlY0j+rkzErS1qgiKSYOChEzg1rrsfHEyrUx4zXn4nYI5UXn7t7:rp3a8MdjHzXiKSuGzg1rrl04i3V

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks