General

  • Target

    afdcc667bc00a776021e3832f2232c667142cb7280e2e725859c030c55a002bb

  • Size

    266KB

  • Sample

    240509-3cxgtach61

  • MD5

    1c89b478ee4b0854331cc28dd340e331

  • SHA1

    8b2ed25413f5da8e1f7cd7ad48a922229bf94181

  • SHA256

    afdcc667bc00a776021e3832f2232c667142cb7280e2e725859c030c55a002bb

  • SHA512

    8c1ffc54a2b1ca5cde5d8f377cc797fa8fecfd3f4d18b3eb42bc5b6e88ebc0b6c97bf9ed33ad44512356015b239d592c14a6adfa7946cf90fe119333db834e9a

  • SSDEEP

    3072:Yg74YilIqFnVlFAO88sDslITlluen2JAV/jMQ5ft3hLU:YBYqIqFnVEO8F+EwOjMkhw

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.151

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Targets

    • Target

      afdcc667bc00a776021e3832f2232c667142cb7280e2e725859c030c55a002bb

    • Size

      266KB

    • MD5

      1c89b478ee4b0854331cc28dd340e331

    • SHA1

      8b2ed25413f5da8e1f7cd7ad48a922229bf94181

    • SHA256

      afdcc667bc00a776021e3832f2232c667142cb7280e2e725859c030c55a002bb

    • SHA512

      8c1ffc54a2b1ca5cde5d8f377cc797fa8fecfd3f4d18b3eb42bc5b6e88ebc0b6c97bf9ed33ad44512356015b239d592c14a6adfa7946cf90fe119333db834e9a

    • SSDEEP

      3072:Yg74YilIqFnVlFAO88sDslITlluen2JAV/jMQ5ft3hLU:YBYqIqFnVEO8F+EwOjMkhw

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks