General

  • Target

    d610bf2729627219f4e4a10e449508415b7cc8ac6cf399119a9736b51c429c70

  • Size

    430KB

  • Sample

    240328-gqjbfsef4t

  • MD5

    4e7d04fb3ef9422239591396bc3e2360

  • SHA1

    ef2350592df4d1a129f11e7c2a3398d4887f1e7d

  • SHA256

    d610bf2729627219f4e4a10e449508415b7cc8ac6cf399119a9736b51c429c70

  • SHA512

    feb20de1979f11009831bc8597ff114e1f9485009f06f9785f754a7f9d382730bd94c2ae54a90d4f63509daf3322ea66c2e0e23803ca791d1ea87917a6a7b05c

  • SSDEEP

    6144:WA9Kay5V+iwqNJ8wH8COxLW10sHtiUh0CrvWqI3CjAD9Ro7:N9KaMV4qL8mlEW1BHAdCDWqsxa7

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Targets

    • Target

      d610bf2729627219f4e4a10e449508415b7cc8ac6cf399119a9736b51c429c70

    • Size

      430KB

    • MD5

      4e7d04fb3ef9422239591396bc3e2360

    • SHA1

      ef2350592df4d1a129f11e7c2a3398d4887f1e7d

    • SHA256

      d610bf2729627219f4e4a10e449508415b7cc8ac6cf399119a9736b51c429c70

    • SHA512

      feb20de1979f11009831bc8597ff114e1f9485009f06f9785f754a7f9d382730bd94c2ae54a90d4f63509daf3322ea66c2e0e23803ca791d1ea87917a6a7b05c

    • SSDEEP

      6144:WA9Kay5V+iwqNJ8wH8COxLW10sHtiUh0CrvWqI3CjAD9Ro7:N9KaMV4qL8mlEW1BHAdCDWqsxa7

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks