General

  • Target

    e6734266a2e06d8c717cc1df819f1b5ebf8f6aea7574d7c7758b09cb96fe6d42

  • Size

    239KB

  • Sample

    240513-x79gzaba51

  • MD5

    99cdc0ef8318f49548f4e436ebe95224

  • SHA1

    98b3a5f3ff45e18214768bbd65e0635fbde53883

  • SHA256

    e6734266a2e06d8c717cc1df819f1b5ebf8f6aea7574d7c7758b09cb96fe6d42

  • SHA512

    c3c038acadce42151163c7d0916409eb1bb1385f4b0e7c93c29245d60a5cdbcddd742cf67496754c2738cc601d94195ef91e2e61022084f10ef7b1d51d7f3e17

  • SSDEEP

    3072:8D1zCO10qha3SwlEjZkRj2NBS85ip5I58l5hWqKNs2:8ZzC8a3TEkRj2N3ips8ZbIF

Malware Config

Extracted

Family

stealc

C2

http://185.172.128.151

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Targets

    • Target

      e6734266a2e06d8c717cc1df819f1b5ebf8f6aea7574d7c7758b09cb96fe6d42

    • Size

      239KB

    • MD5

      99cdc0ef8318f49548f4e436ebe95224

    • SHA1

      98b3a5f3ff45e18214768bbd65e0635fbde53883

    • SHA256

      e6734266a2e06d8c717cc1df819f1b5ebf8f6aea7574d7c7758b09cb96fe6d42

    • SHA512

      c3c038acadce42151163c7d0916409eb1bb1385f4b0e7c93c29245d60a5cdbcddd742cf67496754c2738cc601d94195ef91e2e61022084f10ef7b1d51d7f3e17

    • SSDEEP

      3072:8D1zCO10qha3SwlEjZkRj2NBS85ip5I58l5hWqKNs2:8ZzC8a3TEkRj2N3ips8ZbIF

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks