General

  • Target

    436e62a468946fe00a44d90a530432185885c5f00c9371ab4a83617bdd68d824

  • Size

    271KB

  • Sample

    240502-hrlnmsdh96

  • MD5

    b985e0c0e6194b637eeb40f574431798

  • SHA1

    c7439a3ebe93e2acfd9b46e356ea4adcc2fa00e0

  • SHA256

    436e62a468946fe00a44d90a530432185885c5f00c9371ab4a83617bdd68d824

  • SHA512

    4e21cf5fe63efa64da6c1d6fed9e2bb6148b8816569a8b357a728e9c0d3955b107d5c5131f90962a12e6faf9d4cea74749a6a2f76500efb65a9ec3dd46674649

  • SSDEEP

    3072:b+bOq5p8MpX9ov+HAL+lS5pWzhFb/qsEPj8RtXuq6EbUjUr4NtewnosrVw40EPbO:06Ml2vTfY/jqDj8Rt+pEb3rKm4pPT

Malware Config

Extracted

Family

stealc

C2

http://okkolus.com

Attributes
  • url_path

    /cf5cbdf706840b3f.php

Targets

    • Target

      436e62a468946fe00a44d90a530432185885c5f00c9371ab4a83617bdd68d824

    • Size

      271KB

    • MD5

      b985e0c0e6194b637eeb40f574431798

    • SHA1

      c7439a3ebe93e2acfd9b46e356ea4adcc2fa00e0

    • SHA256

      436e62a468946fe00a44d90a530432185885c5f00c9371ab4a83617bdd68d824

    • SHA512

      4e21cf5fe63efa64da6c1d6fed9e2bb6148b8816569a8b357a728e9c0d3955b107d5c5131f90962a12e6faf9d4cea74749a6a2f76500efb65a9ec3dd46674649

    • SSDEEP

      3072:b+bOq5p8MpX9ov+HAL+lS5pWzhFb/qsEPj8RtXuq6EbUjUr4NtewnosrVw40EPbO:06Ml2vTfY/jqDj8Rt+pEb3rKm4pPT

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks