General

  • Target

    b145802edeb77796cac21fdc457ea0a0.exe

  • Size

    172KB

  • Sample

    240220-m4jf9sfg88

  • MD5

    b145802edeb77796cac21fdc457ea0a0

  • SHA1

    cb1d8ea12c8f6a2234b237303ec4b7f364860775

  • SHA256

    25a9e276730dd6c1ec9cee69bd3c3736c00591cb0d27ce7cf1afa16791d425d4

  • SHA512

    0322c9775b43326f3adecdd478d10b59c6a5e39c00bdfa2c4d0593116d03fe11afbe4b7c4df4fd7211ff46886b2e178c0b61b90dbbf8ebe383fce1cd7b1981a0

  • SSDEEP

    3072:nUS3+xeclPr2NlHfrEKBSgaB5uYBNlGLfLHinYkSOKfAzyi:nUW+xllwJgKBSgaTRUTLCWDoz

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.145

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Targets

    • Target

      b145802edeb77796cac21fdc457ea0a0.exe

    • Size

      172KB

    • MD5

      b145802edeb77796cac21fdc457ea0a0

    • SHA1

      cb1d8ea12c8f6a2234b237303ec4b7f364860775

    • SHA256

      25a9e276730dd6c1ec9cee69bd3c3736c00591cb0d27ce7cf1afa16791d425d4

    • SHA512

      0322c9775b43326f3adecdd478d10b59c6a5e39c00bdfa2c4d0593116d03fe11afbe4b7c4df4fd7211ff46886b2e178c0b61b90dbbf8ebe383fce1cd7b1981a0

    • SSDEEP

      3072:nUS3+xeclPr2NlHfrEKBSgaB5uYBNlGLfLHinYkSOKfAzyi:nUW+xllwJgKBSgaTRUTLCWDoz

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks