General

  • Target

    656e8b562ba39d905ee6e3112aeb17c9a38d2a7019209aeabc5d85e15ef27ad6

  • Size

    265KB

  • Sample

    240430-ythb1agf96

  • MD5

    22a64d000d66b11623fba80ab6420213

  • SHA1

    a134b4d064be83ca505d74f4ccf0803faee1d118

  • SHA256

    656e8b562ba39d905ee6e3112aeb17c9a38d2a7019209aeabc5d85e15ef27ad6

  • SHA512

    c2d283cd5d1670bb80265ae8b724e4c841ab353fb94809c4e16594eb35a3385f9732d25daaa3fd7e9fcf7ead7d4b59b3ef77e76cd1a735636a2c0f2b53308db9

  • SSDEEP

    3072:+h18GlgpKG1Em+R+gT0AdQ3Kid/DBdA7oImMMldX+vT0Inpcpm9ydLgVwU:+duRSmNgTA6iRdQoLldOvT0I+lk

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.151

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Targets

    • Target

      656e8b562ba39d905ee6e3112aeb17c9a38d2a7019209aeabc5d85e15ef27ad6

    • Size

      265KB

    • MD5

      22a64d000d66b11623fba80ab6420213

    • SHA1

      a134b4d064be83ca505d74f4ccf0803faee1d118

    • SHA256

      656e8b562ba39d905ee6e3112aeb17c9a38d2a7019209aeabc5d85e15ef27ad6

    • SHA512

      c2d283cd5d1670bb80265ae8b724e4c841ab353fb94809c4e16594eb35a3385f9732d25daaa3fd7e9fcf7ead7d4b59b3ef77e76cd1a735636a2c0f2b53308db9

    • SSDEEP

      3072:+h18GlgpKG1Em+R+gT0AdQ3Kid/DBdA7oImMMldX+vT0Inpcpm9ydLgVwU:+duRSmNgTA6iRdQoLldOvT0I+lk

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks