General

  • Target

    aee460795761ba693d47ea2cf3a1a8354adc2233fe0a4a39b367a690f4862435

  • Size

    204KB

  • Sample

    240524-behynafe6s

  • MD5

    3ee95f93061768f30342cb1b4c52b1cb

  • SHA1

    d141e902407ff237b6742e759be36896d3559015

  • SHA256

    aee460795761ba693d47ea2cf3a1a8354adc2233fe0a4a39b367a690f4862435

  • SHA512

    bd64e9d139360b222bd50a2a0c7bde3c0238c0576f0b027e5ac51575fd097a4f4fe0f99976ece3d634b519c35963a01544f4576807558e0ba272c8b53eb4e612

  • SSDEEP

    3072:MJBsWMAPPkux+ss6gE1E5SSdhGUiE33MdJ89H3R+mRNx7LNQgLYS:McTgPguYSOGRy8dJeH3R+mRNZeGY

Malware Config

Extracted

Family

stealc

Botnet

default11

C2

http://185.172.128.170

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Targets

    • Target

      aee460795761ba693d47ea2cf3a1a8354adc2233fe0a4a39b367a690f4862435

    • Size

      204KB

    • MD5

      3ee95f93061768f30342cb1b4c52b1cb

    • SHA1

      d141e902407ff237b6742e759be36896d3559015

    • SHA256

      aee460795761ba693d47ea2cf3a1a8354adc2233fe0a4a39b367a690f4862435

    • SHA512

      bd64e9d139360b222bd50a2a0c7bde3c0238c0576f0b027e5ac51575fd097a4f4fe0f99976ece3d634b519c35963a01544f4576807558e0ba272c8b53eb4e612

    • SSDEEP

      3072:MJBsWMAPPkux+ss6gE1E5SSdhGUiE33MdJ89H3R+mRNx7LNQgLYS:McTgPguYSOGRy8dJeH3R+mRNZeGY

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks