General

  • Target

    029d4aa2f16cafa871c54f8c9c96da5973e313ef32bf1438e0e6367f5fd32d5d

  • Size

    305KB

  • Sample

    240521-sx5c2sae8z

  • MD5

    7aaba56e05288f2c71b42674a4be4f3b

  • SHA1

    0b881c74bca8518057db778eb0c6fcfe64b41d5d

  • SHA256

    029d4aa2f16cafa871c54f8c9c96da5973e313ef32bf1438e0e6367f5fd32d5d

  • SHA512

    148a2f2e7d241c37777e4d09b04e75bb4999bade4e59fab4799ecbd233ab5e8b070dd590be46849bc4ff81820ba7ccf4304a249161d5e648a9356213bb9acf9f

  • SSDEEP

    3072:3c+E3HGr3+hagEUH9C/H8lRYAyuc3jbbeO25g4kBy:3q3H2g/9Z0AZqbbeOD4kB

Malware Config

Extracted

Family

stealc

Botnet

default11

C2

http://185.172.128.170

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Targets

    • Target

      029d4aa2f16cafa871c54f8c9c96da5973e313ef32bf1438e0e6367f5fd32d5d

    • Size

      305KB

    • MD5

      7aaba56e05288f2c71b42674a4be4f3b

    • SHA1

      0b881c74bca8518057db778eb0c6fcfe64b41d5d

    • SHA256

      029d4aa2f16cafa871c54f8c9c96da5973e313ef32bf1438e0e6367f5fd32d5d

    • SHA512

      148a2f2e7d241c37777e4d09b04e75bb4999bade4e59fab4799ecbd233ab5e8b070dd590be46849bc4ff81820ba7ccf4304a249161d5e648a9356213bb9acf9f

    • SSDEEP

      3072:3c+E3HGr3+hagEUH9C/H8lRYAyuc3jbbeO25g4kBy:3q3H2g/9Z0AZqbbeOD4kB

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks