General

  • Target

    29317554bc596ed20d4bb755809729dc.bin

  • Size

    129KB

  • Sample

    240312-b4f6cscc9z

  • MD5

    fbe0d4dc6893693960f4811d94ab72b2

  • SHA1

    40c2d8939caf88b0b6d115aa92b15a8653800207

  • SHA256

    2b8d55b88e588eecab05dcfaa41a5acdfd5434e9de74692aed1424377632956f

  • SHA512

    2bcc81a04483017f99646f2bf9c65d67551ee600fca3ca6d2df6d81cb45cd1ec3602e7020f4e0ec8bfceca8c4059ca87f309b05b53a46daf764f09aa98dd3754

  • SSDEEP

    3072:lREQoXruo3qJviIRS0gF84a3sc8pk0Ozfk:zUXruY2i8A8hsc8p4fk

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.210

Attributes
  • url_path

    /f993692117a3fda2.php

Targets

    • Target

      6a9dd15e8c6b7a7399660de536643430c0fdfee0faadfe97ce721a8bb2d893f0.exe

    • Size

      200KB

    • MD5

      29317554bc596ed20d4bb755809729dc

    • SHA1

      0f635a2651f844b48dda7f64a1a73764aa4b4c1c

    • SHA256

      6a9dd15e8c6b7a7399660de536643430c0fdfee0faadfe97ce721a8bb2d893f0

    • SHA512

      03804c9eb8b094319fba18c9ed1d1b87d718c0be79fb6de7a0845ca111f9f2c10c207bb4df876ac0952c0a93b181d98b06b5200d8d670bd391b7b993c2c3856d

    • SSDEEP

      3072:Kknc6/qwFdaCHYE+KMLjktyWIlFhwSuexMXcn7i+85Odddhr:fnVSwaC5mk3IttucMXcnR8mddh

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks