General

  • Target

    4047c72a87c09dd628cee52359a6e4ecb8b647b63d74b9bcb4ed6999d0287f75

  • Size

    273KB

  • Sample

    240502-mtsbeshc69

  • MD5

    5c5242d71095a3bdcc40cccddc7f7e5f

  • SHA1

    cb5dde215f7335e567bde5e4b5405c449c545b48

  • SHA256

    4047c72a87c09dd628cee52359a6e4ecb8b647b63d74b9bcb4ed6999d0287f75

  • SHA512

    b677baa6e08005cb3afc442b6a47ec57cde7e917f62439ed6c470ed9688c3a4f648b84eb6ec4c1970b6fcee3a8d3702234bd14e015850ee0232193bb35d1021d

  • SSDEEP

    3072:dbrsqDBDi8pnDB1voWEV+rVuUD0KMO5uPFj8fpUlXES+WPF9UucDS/EPbDCR:dhHJB9yVJkfIj2pEedSyP

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.151

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Targets

    • Target

      4047c72a87c09dd628cee52359a6e4ecb8b647b63d74b9bcb4ed6999d0287f75

    • Size

      273KB

    • MD5

      5c5242d71095a3bdcc40cccddc7f7e5f

    • SHA1

      cb5dde215f7335e567bde5e4b5405c449c545b48

    • SHA256

      4047c72a87c09dd628cee52359a6e4ecb8b647b63d74b9bcb4ed6999d0287f75

    • SHA512

      b677baa6e08005cb3afc442b6a47ec57cde7e917f62439ed6c470ed9688c3a4f648b84eb6ec4c1970b6fcee3a8d3702234bd14e015850ee0232193bb35d1021d

    • SSDEEP

      3072:dbrsqDBDi8pnDB1voWEV+rVuUD0KMO5uPFj8fpUlXES+WPF9UucDS/EPbDCR:dhHJB9yVJkfIj2pEedSyP

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks