General

  • Target

    b9f0d560b1dbc7c3b7066bb398c4e280878c07c41523f75385cf841d90c6b36a

  • Size

    1.8MB

  • Sample

    240312-bw3z6aca7y

  • MD5

    2c49e84b995fae079eebf654b00723e7

  • SHA1

    f996ae30e005f7c23560eb5e2650d621653ebbd8

  • SHA256

    b9f0d560b1dbc7c3b7066bb398c4e280878c07c41523f75385cf841d90c6b36a

  • SHA512

    3c192a9cc1ea4f515166fe00d5be2c472a69d6238f4ee56d5395b707f2e4a2dd71807d9dd778298b36bc9f696c772c8275b77bcc052a3f5e8903e70a888af9e2

  • SSDEEP

    49152:tIiiK2S2HDNbyTA1hClcC6O+84qYtrSVq2jMkAfG4bley:qiiK2BDN2TASGlgYMV/fAO+D

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.145

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Targets

    • Target

      b9f0d560b1dbc7c3b7066bb398c4e280878c07c41523f75385cf841d90c6b36a

    • Size

      1.8MB

    • MD5

      2c49e84b995fae079eebf654b00723e7

    • SHA1

      f996ae30e005f7c23560eb5e2650d621653ebbd8

    • SHA256

      b9f0d560b1dbc7c3b7066bb398c4e280878c07c41523f75385cf841d90c6b36a

    • SHA512

      3c192a9cc1ea4f515166fe00d5be2c472a69d6238f4ee56d5395b707f2e4a2dd71807d9dd778298b36bc9f696c772c8275b77bcc052a3f5e8903e70a888af9e2

    • SSDEEP

      49152:tIiiK2S2HDNbyTA1hClcC6O+84qYtrSVq2jMkAfG4bley:qiiK2BDN2TASGlgYMV/fAO+D

    • Stealc

      Stealc is an infostealer written in C++.

    • Detect binaries embedding considerable number of MFA browser extension IDs.

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • UPX dump on OEP (original entry point)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Target

      $PLUGINSDIR/INetC.dll

    • Size

      21KB

    • MD5

      2b342079303895c50af8040a91f30f71

    • SHA1

      b11335e1cb8356d9c337cb89fe81d669a69de17e

    • SHA256

      2d5d89025911e2e273f90f393624be4819641dbee1606de792362e442e54612f

    • SHA512

      550452dadc86ecd205f40668894116790a456fe46e9985d68093d36cf32abf00edecb5c56ff0287464a0e819db7b3cc53926037a116de6c651332a7cc8035d47

    • SSDEEP

      384:KOoVVefeWsI7rsIquPLNN546o0Ac9khYLMkIX0+Gzyekv:4VVaeE7wIqyJN5i

    Score
    3/10
    • Target

      $TEMP/BroomSetup.exe

    • Size

      1.7MB

    • MD5

      eee5ddcffbed16222cac0a1b4e2e466e

    • SHA1

      28b40c88b8ea50b0782e2bcbb4cc0f411035f3d5

    • SHA256

      2a40e5dccc7526c4982334941c90f95374460e2a816e84e724e98c4d52ae8c54

    • SHA512

      8f88901f3ebd425818db09f268df19ccf8a755603f04e9481bcf02b112a84393f8a900ead77f8f971bfa33fd9fa5636b7494aaee864a0fb04e3273911a4216dc

    • SSDEEP

      49152:YUnaQiKJ8N+AadA6mICFhNGffVCPi9NUko6jE:ZwKa+u6mICFSwPKDK

    Score
    9/10
    • UPX dump on OEP (original entry point)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      $TEMP/syncUpd.exe

    • Size

      200KB

    • MD5

      94bbc397cb882051d1e8b213a06c8200

    • SHA1

      05e330dd31360ef34a90f96d385a28c0ae246faf

    • SHA256

      6d2fedb6293fe0035eb0ce4380cbf993865d3fff561add74861516ae977519c5

    • SHA512

      8151836eb9f3605af9e3569ffaa13b749d8d2522181e1864b072e59196ba95f3aaa79bc6aba75eb080ebd9c587aac5f2d9057825b29ff96ab052a1164cab6f45

    • SSDEEP

      3072:lY0uzo/Zu0Pdchw5isIHTsfXBOGElt5HZXEc4GDZ1:+0t/ZcFd0XBODR53D

    • Stealc

      Stealc is an infostealer written in C++.

    • Detect binaries embedding considerable number of MFA browser extension IDs.

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks