General

  • Target

    fa854b73b477f55bd2faa482ba8e8fc4.exe

  • Size

    1.3MB

  • Sample

    240507-zj95psfa3t

  • MD5

    fa854b73b477f55bd2faa482ba8e8fc4

  • SHA1

    056fb1cdf016ac6d510425ae4dc1693f257dc12e

  • SHA256

    905c7a4a098ad5c0fae3b8f15fa5fa56a06372b7441aede1958ae1171e555b2a

  • SHA512

    fe1b5c9c6a709b34687e35745bd7662aaff0bf816aedb4f59a68714c4797034e1472c667611eb10fb687916e899613fbb79d692a11cc5e074fce5a2ba1ee54c5

  • SSDEEP

    24576:ZtnIMSJmXTYznHLtEqzH+qrjQYgkIuIcDH7IueXN5CUaCWyOVyOckiAhUcMkiAhl:ZtIMvE7rtz7+q/QYgkIu3DHkuedz6rVl

Malware Config

Extracted

Family

stealc

C2

http://193.163.7.82

Attributes
  • url_path

    /722c81812703a73d.php

Targets

    • Target

      fa854b73b477f55bd2faa482ba8e8fc4.exe

    • Size

      1.3MB

    • MD5

      fa854b73b477f55bd2faa482ba8e8fc4

    • SHA1

      056fb1cdf016ac6d510425ae4dc1693f257dc12e

    • SHA256

      905c7a4a098ad5c0fae3b8f15fa5fa56a06372b7441aede1958ae1171e555b2a

    • SHA512

      fe1b5c9c6a709b34687e35745bd7662aaff0bf816aedb4f59a68714c4797034e1472c667611eb10fb687916e899613fbb79d692a11cc5e074fce5a2ba1ee54c5

    • SSDEEP

      24576:ZtnIMSJmXTYznHLtEqzH+qrjQYgkIuIcDH7IueXN5CUaCWyOVyOckiAhUcMkiAhl:ZtIMvE7rtz7+q/QYgkIu3DHkuedz6rVl

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks