General

  • Target

    248e44bc57e583378e77b3b1d6d9677a9dcd00187ea0aa3cbe073fa6fba984fc

  • Size

    378KB

  • Sample

    240328-bmxf1sab79

  • MD5

    b46ef79a30cf9668a63ff8117f36f749

  • SHA1

    23c339a3eb84d2d9dedf4ae0eafeaaa8d5cde7ed

  • SHA256

    248e44bc57e583378e77b3b1d6d9677a9dcd00187ea0aa3cbe073fa6fba984fc

  • SHA512

    2891d70de1be8e7c2a5eebb88b6b8fc2c70cf1278a6d81ecb2b1220c44986eea4938c6a1cf7321b33d347cf4313d5520c3c24a017ceec2087b69ca07c12709da

  • SSDEEP

    6144:mQPigIy6/2sIvNaGuJ8I6S1AsuXybXs2PwHq+51ZiQ44n4:YgIyLs2IGU6FsUA8VHEk4

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Targets

    • Target

      248e44bc57e583378e77b3b1d6d9677a9dcd00187ea0aa3cbe073fa6fba984fc

    • Size

      378KB

    • MD5

      b46ef79a30cf9668a63ff8117f36f749

    • SHA1

      23c339a3eb84d2d9dedf4ae0eafeaaa8d5cde7ed

    • SHA256

      248e44bc57e583378e77b3b1d6d9677a9dcd00187ea0aa3cbe073fa6fba984fc

    • SHA512

      2891d70de1be8e7c2a5eebb88b6b8fc2c70cf1278a6d81ecb2b1220c44986eea4938c6a1cf7321b33d347cf4313d5520c3c24a017ceec2087b69ca07c12709da

    • SSDEEP

      6144:mQPigIy6/2sIvNaGuJ8I6S1AsuXybXs2PwHq+51ZiQ44n4:YgIyLs2IGU6FsUA8VHEk4

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks