General

  • Target

    fb7c1ec1f6a9f687658034072d6ed1b6e833ecfc00b3f5a9efda4fa1d960aefa

  • Size

    327KB

  • Sample

    240504-zcgjtaae7v

  • MD5

    dcbb78d238e21765d3acc5fa4489246d

  • SHA1

    d2b49209e6445c263706333c5ab9b7ffae4259bd

  • SHA256

    fb7c1ec1f6a9f687658034072d6ed1b6e833ecfc00b3f5a9efda4fa1d960aefa

  • SHA512

    c5a499e20c5bdfb78f34a719231954cd04d8fdd4c2e77fd7def26a5d0679d8d89178dd77b1a0e8c5328ca392e82a89d0ab4296a7ddffcaa9ce03689e306e502e

  • SSDEEP

    6144:us94kxT40WyHNLJ02Wn7tDrw6Ekj7lSxTpjKRqBQe:v9PT40W6kprw65wTp2sx

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      fb7c1ec1f6a9f687658034072d6ed1b6e833ecfc00b3f5a9efda4fa1d960aefa

    • Size

      327KB

    • MD5

      dcbb78d238e21765d3acc5fa4489246d

    • SHA1

      d2b49209e6445c263706333c5ab9b7ffae4259bd

    • SHA256

      fb7c1ec1f6a9f687658034072d6ed1b6e833ecfc00b3f5a9efda4fa1d960aefa

    • SHA512

      c5a499e20c5bdfb78f34a719231954cd04d8fdd4c2e77fd7def26a5d0679d8d89178dd77b1a0e8c5328ca392e82a89d0ab4296a7ddffcaa9ce03689e306e502e

    • SSDEEP

      6144:us94kxT40WyHNLJ02Wn7tDrw6Ekj7lSxTpjKRqBQe:v9PT40W6kprw65wTp2sx

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks