General

  • Target

    cstealer.exe

  • Size

    11.6MB

  • Sample

    240419-bt5e7sdg5t

  • MD5

    57eef9f9f2951d6396e3b5d55df39f38

  • SHA1

    a6a9f3ac132de046615ab4d8bde7f231b5cdfbca

  • SHA256

    207f19322bf7c4c646bd36e615760bd5dd0a392f6709be3c5fcba7e5504a161a

  • SHA512

    d422c7821a0b16423c3d41d07f2277757378fb43aba44fe83e0f8ec332776e16f7768fe108c559a5c9ef1e54554833986ea4cd8b09cfad3448e4950ef0cf5be7

  • SSDEEP

    196608:thlgYEkfbdqBA1HeT39IigwdeE9TFa0Z8DOjCdylUhYMfnSEtT56QOZAzoyKC:NEkfb4q1+TtIiFUY9Z8D8Ccl6lq2TLo6

Malware Config

Targets

    • Target

      cstealer.exe

    • Size

      11.6MB

    • MD5

      57eef9f9f2951d6396e3b5d55df39f38

    • SHA1

      a6a9f3ac132de046615ab4d8bde7f231b5cdfbca

    • SHA256

      207f19322bf7c4c646bd36e615760bd5dd0a392f6709be3c5fcba7e5504a161a

    • SHA512

      d422c7821a0b16423c3d41d07f2277757378fb43aba44fe83e0f8ec332776e16f7768fe108c559a5c9ef1e54554833986ea4cd8b09cfad3448e4950ef0cf5be7

    • SSDEEP

      196608:thlgYEkfbdqBA1HeT39IigwdeE9TFa0Z8DOjCdylUhYMfnSEtT56QOZAzoyKC:NEkfb4q1+TtIiFUY9Z8D8Ccl6lq2TLo6

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks