General

  • Target

    b6a9cd02057b0b3bae04386b9006b2ef9fa39c64f4cdaec29386994838f24da0

  • Size

    264KB

  • Sample

    240507-3ttr9ahg57

  • MD5

    2fc28fb1b9340d1655dce8bb60b14466

  • SHA1

    605d342cb6c3fdfa04082eb5d6c3690ecf41b816

  • SHA256

    b6a9cd02057b0b3bae04386b9006b2ef9fa39c64f4cdaec29386994838f24da0

  • SHA512

    65a67d7ddba61d017b53657f32e8322ac33770fb02e097bffc71a7c954851018bc28ad61f5f10dc5095090a66c7d249eacb314a1713e292bfae45c2a0033a3d7

  • SSDEEP

    3072:F4Tk9/pQXkniR+UAL+uGZnbLWufj5KJXOMciwGmZhbjRe47ThbiqEPbDC5Td:Nq0iRv1nWWdKYM1MjReEThevPcT

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.151

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Targets

    • Target

      b6a9cd02057b0b3bae04386b9006b2ef9fa39c64f4cdaec29386994838f24da0

    • Size

      264KB

    • MD5

      2fc28fb1b9340d1655dce8bb60b14466

    • SHA1

      605d342cb6c3fdfa04082eb5d6c3690ecf41b816

    • SHA256

      b6a9cd02057b0b3bae04386b9006b2ef9fa39c64f4cdaec29386994838f24da0

    • SHA512

      65a67d7ddba61d017b53657f32e8322ac33770fb02e097bffc71a7c954851018bc28ad61f5f10dc5095090a66c7d249eacb314a1713e292bfae45c2a0033a3d7

    • SSDEEP

      3072:F4Tk9/pQXkniR+UAL+uGZnbLWufj5KJXOMciwGmZhbjRe47ThbiqEPbDC5Td:Nq0iRv1nWWdKYM1MjReEThevPcT

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks