General

  • Target

    8122ab1285665bacd89fa9865281315c62b94eb10910927283424ff283f5fb1b

  • Size

    231KB

  • Sample

    240510-vsk5qage2s

  • MD5

    eabfdaca74d258561209e731259bf818

  • SHA1

    5bf324d6792cef6cb1663c88002480029aa8c1a8

  • SHA256

    8122ab1285665bacd89fa9865281315c62b94eb10910927283424ff283f5fb1b

  • SHA512

    42277497bb262f951f066b1e069c57173832b5cc7697111c80b1a5f95f769fed4a3cc6ff4d96d8ad78f60690fec2a1a7497d8f0b24a6971fd70a67ac63f32ef3

  • SSDEEP

    3072:eiJk28wg9Dqp8aWxJMMUW+FKR5XjGzzbE3WnQpClVLPwTeebEZdSBTGR:e08sGTxeWhcDEGndLYTl2mTu

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.150

Attributes
  • url_path

    /c698e1bc8a2f5e6d.php

Targets

    • Target

      8122ab1285665bacd89fa9865281315c62b94eb10910927283424ff283f5fb1b

    • Size

      231KB

    • MD5

      eabfdaca74d258561209e731259bf818

    • SHA1

      5bf324d6792cef6cb1663c88002480029aa8c1a8

    • SHA256

      8122ab1285665bacd89fa9865281315c62b94eb10910927283424ff283f5fb1b

    • SHA512

      42277497bb262f951f066b1e069c57173832b5cc7697111c80b1a5f95f769fed4a3cc6ff4d96d8ad78f60690fec2a1a7497d8f0b24a6971fd70a67ac63f32ef3

    • SSDEEP

      3072:eiJk28wg9Dqp8aWxJMMUW+FKR5XjGzzbE3WnQpClVLPwTeebEZdSBTGR:e08sGTxeWhcDEGndLYTl2mTu

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks