General

  • Target

    60f32465f2f1eef8d2a246e71f92497c.exe

  • Size

    248KB

  • Sample

    240511-pq62hsba54

  • MD5

    60f32465f2f1eef8d2a246e71f92497c

  • SHA1

    c90515d6b4621f976e18934d3a9cd6be6999613f

  • SHA256

    b927e42b91a9d16139e8e8dc56b6550590d55a0a0a7ea7614a77ec800f5cb435

  • SHA512

    2faab8dbfc7cf336a18ddc6517ac3bef6f0f309c3c7834d139d6f35efcceb7ef46ba3ec7663ba356027fd6a2b96cfef36cd69742d1dad7df04cabb9e798749eb

  • SSDEEP

    6144:t9D7v5zE9dnXgzGX1U11XXSved2HbAeZxnmC54ID23QDesp+:t57+91m1XivZAOx1DChsp+

Malware Config

Extracted

Family

stealc

C2

http://49.13.229.86

Attributes
  • url_path

    /c73eed764cc59dcb.php

Targets

    • Target

      60f32465f2f1eef8d2a246e71f92497c.exe

    • Size

      248KB

    • MD5

      60f32465f2f1eef8d2a246e71f92497c

    • SHA1

      c90515d6b4621f976e18934d3a9cd6be6999613f

    • SHA256

      b927e42b91a9d16139e8e8dc56b6550590d55a0a0a7ea7614a77ec800f5cb435

    • SHA512

      2faab8dbfc7cf336a18ddc6517ac3bef6f0f309c3c7834d139d6f35efcceb7ef46ba3ec7663ba356027fd6a2b96cfef36cd69742d1dad7df04cabb9e798749eb

    • SSDEEP

      6144:t9D7v5zE9dnXgzGX1U11XXSved2HbAeZxnmC54ID23QDesp+:t57+91m1XivZAOx1DChsp+

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks