General

  • Target

    35e8e659e793883b7f568ba946c18dd65837507e9e390908182e0ee69ff2890e

  • Size

    223KB

  • Sample

    240508-3rpqhsge98

  • MD5

    244dccb1ff88085f7631a6949887d4c2

  • SHA1

    7563bb3b80e688a91a186e2ce167a2b657bc3a2c

  • SHA256

    35e8e659e793883b7f568ba946c18dd65837507e9e390908182e0ee69ff2890e

  • SHA512

    7d7ca5ce2c35158a33c7b47ad6944213acae6853abf4748bbad75f4169ca6fd2afc8677d5aa14f017da9404c0bbb2370a8f14ae9caae9d6793c0b5122c6b52e1

  • SSDEEP

    3072:WVzC+XJHNnFaKSniIB/W+z+pOBeDDB+U1sNSkJ/pYhjskzY817vUycrfLFzhTM15:cFapB/WZJDB+U1s4Wpd81zjcXFzhTB

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.151

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Targets

    • Target

      35e8e659e793883b7f568ba946c18dd65837507e9e390908182e0ee69ff2890e

    • Size

      223KB

    • MD5

      244dccb1ff88085f7631a6949887d4c2

    • SHA1

      7563bb3b80e688a91a186e2ce167a2b657bc3a2c

    • SHA256

      35e8e659e793883b7f568ba946c18dd65837507e9e390908182e0ee69ff2890e

    • SHA512

      7d7ca5ce2c35158a33c7b47ad6944213acae6853abf4748bbad75f4169ca6fd2afc8677d5aa14f017da9404c0bbb2370a8f14ae9caae9d6793c0b5122c6b52e1

    • SSDEEP

      3072:WVzC+XJHNnFaKSniIB/W+z+pOBeDDB+U1sNSkJ/pYhjskzY817vUycrfLFzhTM15:cFapB/WZJDB+U1s4Wpd81zjcXFzhTB

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks