General

  • Target

    e292c5ba762558745c0991af90cff74a4ffbe51b7af7992ac825a7fd8264ea41

  • Size

    430KB

  • Sample

    240328-gvnfzacd36

  • MD5

    2febf7511608c5660f67ae3c5ba7ba84

  • SHA1

    7222cba3973432b82a10278cac1c33c2efc5e683

  • SHA256

    e292c5ba762558745c0991af90cff74a4ffbe51b7af7992ac825a7fd8264ea41

  • SHA512

    90e2ae120338c5b18e1c3d876d671dd79c878c62d1aa2e4fe5434ef8a127f71dab040e33a9234922a3b6490a0e23db33e10ca43e4f44a3e18f57e5df3df53a1a

  • SSDEEP

    6144:WA9Kay5V+iwqNJ8wH8COxLW10sHtiUh0CrvWqI3CjAD9Ro/:N9KaMV4qL8mlEW1BHAdCDWqsxa/

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.209

Attributes
  • url_path

    /3cd2b41cbde8fc9c.php

Targets

    • Target

      e292c5ba762558745c0991af90cff74a4ffbe51b7af7992ac825a7fd8264ea41

    • Size

      430KB

    • MD5

      2febf7511608c5660f67ae3c5ba7ba84

    • SHA1

      7222cba3973432b82a10278cac1c33c2efc5e683

    • SHA256

      e292c5ba762558745c0991af90cff74a4ffbe51b7af7992ac825a7fd8264ea41

    • SHA512

      90e2ae120338c5b18e1c3d876d671dd79c878c62d1aa2e4fe5434ef8a127f71dab040e33a9234922a3b6490a0e23db33e10ca43e4f44a3e18f57e5df3df53a1a

    • SSDEEP

      6144:WA9Kay5V+iwqNJ8wH8COxLW10sHtiUh0CrvWqI3CjAD9Ro/:N9KaMV4qL8mlEW1BHAdCDWqsxa/

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks