General

  • Target

    b26c65d6258149bc7790ee5d60c6b7238c8df36c62dacca7342cb5c91510a841

  • Size

    231KB

  • Sample

    240516-3wq45sfc3x

  • MD5

    c8ab0eb4e0011d5a760ef5fd00306e87

  • SHA1

    95f68344270a08c38810ecca72aaf7b4e922895b

  • SHA256

    b26c65d6258149bc7790ee5d60c6b7238c8df36c62dacca7342cb5c91510a841

  • SHA512

    6c65d89bca73dd6971e4990fd3f7ed00214ce504d56c0ceed544d0f7e2b4dd6771eac4bad7812108d016eefe49e95f6a2f1ca738606569e00aafb5a8ed5406cb

  • SSDEEP

    3072:s3JG8nwHHBgKpJDf3AUYA8YIA8M1CPAGV/TFW+F+R5WpKSMqj4Oc7vKfboizWn0R:sRwvWoG7WNMMi7bbzW0zPftMTu

Malware Config

Extracted

Family

stealc

Botnet

default100

C2

http://185.172.128.151

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Targets

    • Target

      b26c65d6258149bc7790ee5d60c6b7238c8df36c62dacca7342cb5c91510a841

    • Size

      231KB

    • MD5

      c8ab0eb4e0011d5a760ef5fd00306e87

    • SHA1

      95f68344270a08c38810ecca72aaf7b4e922895b

    • SHA256

      b26c65d6258149bc7790ee5d60c6b7238c8df36c62dacca7342cb5c91510a841

    • SHA512

      6c65d89bca73dd6971e4990fd3f7ed00214ce504d56c0ceed544d0f7e2b4dd6771eac4bad7812108d016eefe49e95f6a2f1ca738606569e00aafb5a8ed5406cb

    • SSDEEP

      3072:s3JG8nwHHBgKpJDf3AUYA8YIA8M1CPAGV/TFW+F+R5WpKSMqj4Oc7vKfboizWn0R:sRwvWoG7WNMMi7bbzW0zPftMTu

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks