General

  • Target

    Stien.exe

  • Size

    48KB

  • Sample

    240522-e7nw6acb69

  • MD5

    bda9523d7221942e46def67ed473e33e

  • SHA1

    ce837c7ac128e361217316041891da0872b87290

  • SHA256

    ce8f36cb260a5e3d03fab13624208d531551b5dc82e2097b9dd38707c32852de

  • SHA512

    5e8f0e619d8dfc664a8e833243cda8b4cc638a324590e5f26c3d991cca5b674fe9677449163fcb78dea8b8c27c60e37651e63ec6cfac475e2ca404ca1cef6388

  • SSDEEP

    768:+GJzSq8Maq5s9OIyziuT/2dcWhzzkOFbQBU669RhQM+8M+FG:+RqfKOtiuTuRbQALK

Malware Config

Targets

    • Target

      Stien.exe

    • Size

      48KB

    • MD5

      bda9523d7221942e46def67ed473e33e

    • SHA1

      ce837c7ac128e361217316041891da0872b87290

    • SHA256

      ce8f36cb260a5e3d03fab13624208d531551b5dc82e2097b9dd38707c32852de

    • SHA512

      5e8f0e619d8dfc664a8e833243cda8b4cc638a324590e5f26c3d991cca5b674fe9677449163fcb78dea8b8c27c60e37651e63ec6cfac475e2ca404ca1cef6388

    • SSDEEP

      768:+GJzSq8Maq5s9OIyziuT/2dcWhzzkOFbQBU669RhQM+8M+FG:+RqfKOtiuTuRbQALK

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks