General

  • Target

    Application664a6b82cf275.zip

  • Size

    72.8MB

  • Sample

    240519-z23hksac71

  • MD5

    6f7a65d8cc1d73d6377b7796e5aaf3c7

  • SHA1

    8481c8d4b7dfafe086ac85b1cdc1222034fa0b11

  • SHA256

    4bc48b44a70845b1d9667fb7182f8fef848b821a9dbcff1c1de0cc9fc85bf2ed

  • SHA512

    b9ea40abdb98e75b48878fe8f14bdb93a7959efdb4f105e19f63a7686886477366dc01d309ab54247705d0911ab3c47be78cb6bc4e51d10066605bc77ca87a86

  • SSDEEP

    1572864:mTW0tA7ochJ2Kufe5YDIoBxeb/weegXjmCGnnvzew62iZf35M+AL2FGIq1UkP:mTW0C77XbX5Ykobe0ezXjXcv363K+SP

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://147.45.47.71

Attributes
  • url_path

    /eb6f29c6a60b3865.php

Targets

    • Target

      Application664a6b82cf275.zip

    • Size

      72.8MB

    • MD5

      6f7a65d8cc1d73d6377b7796e5aaf3c7

    • SHA1

      8481c8d4b7dfafe086ac85b1cdc1222034fa0b11

    • SHA256

      4bc48b44a70845b1d9667fb7182f8fef848b821a9dbcff1c1de0cc9fc85bf2ed

    • SHA512

      b9ea40abdb98e75b48878fe8f14bdb93a7959efdb4f105e19f63a7686886477366dc01d309ab54247705d0911ab3c47be78cb6bc4e51d10066605bc77ca87a86

    • SSDEEP

      1572864:mTW0tA7ochJ2Kufe5YDIoBxeb/weegXjmCGnnvzew62iZf35M+AL2FGIq1UkP:mTW0C77XbX5Ykobe0ezXjXcv363K+SP

    • Locky

      Ransomware strain released in 2016, with advanced features like anti-analysis.

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Tasks