General

  • Target

    84f2c0f4db7d4f3faf88fe9fb75829b4d480f936929591df7e5b22846dcb5777

  • Size

    230KB

  • Sample

    240510-fr8gascg3z

  • MD5

    ccd572a3007d968e7fc7530b369bdcf6

  • SHA1

    72e0464b18e45f75f194cc5ae6f7d59e2f2d8ca6

  • SHA256

    84f2c0f4db7d4f3faf88fe9fb75829b4d480f936929591df7e5b22846dcb5777

  • SHA512

    b977c3cabfce519c49dad3274c6927f03bec5b502d1bde6fbfc3ebe22880434c6bcb5a19f7d0987328ff71502642680b07cb89435f5a7aafb70261fd3c2b7ebc

  • SSDEEP

    3072:1nrH0rS6R7SM6eUdRV+1p0R6JXojk9WhOmGJmDaJ6acnhC9gDJoRzzyT6yP:1nP6Ron0XolyDVkSJzOTx

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      84f2c0f4db7d4f3faf88fe9fb75829b4d480f936929591df7e5b22846dcb5777

    • Size

      230KB

    • MD5

      ccd572a3007d968e7fc7530b369bdcf6

    • SHA1

      72e0464b18e45f75f194cc5ae6f7d59e2f2d8ca6

    • SHA256

      84f2c0f4db7d4f3faf88fe9fb75829b4d480f936929591df7e5b22846dcb5777

    • SHA512

      b977c3cabfce519c49dad3274c6927f03bec5b502d1bde6fbfc3ebe22880434c6bcb5a19f7d0987328ff71502642680b07cb89435f5a7aafb70261fd3c2b7ebc

    • SSDEEP

      3072:1nrH0rS6R7SM6eUdRV+1p0R6JXojk9WhOmGJmDaJ6acnhC9gDJoRzzyT6yP:1nP6Ron0XolyDVkSJzOTx

    • Buer

      Buer is a new modular loader first seen in August 2019.

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks