General

  • Target

    82fcbe992186cf67ca0aa2da35425353505f9f8c59e0255a64e9e40c65d94e17

  • Size

    266KB

  • Sample

    240507-pk9kfsfe8z

  • MD5

    7ed6ec404f1a557e5c734574421948d3

  • SHA1

    d77c5a4db410b713989427b37f045b824cc1eff5

  • SHA256

    82fcbe992186cf67ca0aa2da35425353505f9f8c59e0255a64e9e40c65d94e17

  • SHA512

    f970692b939cbb898dd4057e7c8095415d6fa3779af22d2ab86fcc6e7edc42151f592545e81c4a617ea40d392fa7943792580fc17acd3667a80a80e72286f3e9

  • SSDEEP

    3072:5l7AZNpX7NadczpkesJZfz1P0aW56TCbs4hLU:5aZvNa29u71P0GCbRhw

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      82fcbe992186cf67ca0aa2da35425353505f9f8c59e0255a64e9e40c65d94e17

    • Size

      266KB

    • MD5

      7ed6ec404f1a557e5c734574421948d3

    • SHA1

      d77c5a4db410b713989427b37f045b824cc1eff5

    • SHA256

      82fcbe992186cf67ca0aa2da35425353505f9f8c59e0255a64e9e40c65d94e17

    • SHA512

      f970692b939cbb898dd4057e7c8095415d6fa3779af22d2ab86fcc6e7edc42151f592545e81c4a617ea40d392fa7943792580fc17acd3667a80a80e72286f3e9

    • SSDEEP

      3072:5l7AZNpX7NadczpkesJZfz1P0aW56TCbs4hLU:5aZvNa29u71P0GCbRhw

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks