General

  • Target

    dca2faec2933dbe461d5583ba92d89633f4c48bb33c39d9f1f9915a323eccff3

  • Size

    216KB

  • Sample

    240524-21zfmsee97

  • MD5

    eeab6b508f842ce18d229914cd7167f7

  • SHA1

    739e0c2cbdc05c27962a4bf5d1388bc31abc8811

  • SHA256

    dca2faec2933dbe461d5583ba92d89633f4c48bb33c39d9f1f9915a323eccff3

  • SHA512

    465d18d0c28b7579cac4f4b3b67a0cb065df699327401d8edbbf7433083863ff36099ba71d4e9784bdb9ce035209b60b330863de917c05f247f93eefbce4ce74

  • SSDEEP

    3072:jMVPYhwPGRcU82DFUT6UX+vkZQ2ftfLmaPUDF2QXrKj1bEVy:IPGdRK2euUXrftjmacDcrj1b

Malware Config

Extracted

Family

stealc

Botnet

default11

C2

http://185.172.128.170

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Targets

    • Target

      dca2faec2933dbe461d5583ba92d89633f4c48bb33c39d9f1f9915a323eccff3

    • Size

      216KB

    • MD5

      eeab6b508f842ce18d229914cd7167f7

    • SHA1

      739e0c2cbdc05c27962a4bf5d1388bc31abc8811

    • SHA256

      dca2faec2933dbe461d5583ba92d89633f4c48bb33c39d9f1f9915a323eccff3

    • SHA512

      465d18d0c28b7579cac4f4b3b67a0cb065df699327401d8edbbf7433083863ff36099ba71d4e9784bdb9ce035209b60b330863de917c05f247f93eefbce4ce74

    • SSDEEP

      3072:jMVPYhwPGRcU82DFUT6UX+vkZQ2ftfLmaPUDF2QXrKj1bEVy:IPGdRK2euUXrftjmacDcrj1b

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks