General

  • Target

    3c781ad13c32a5d187e983671268fe8f8fc7268434c20a1f30e9e6effa307557

  • Size

    249KB

  • Sample

    240531-x73pesae6v

  • MD5

    db5c28a484a44eb2a8079d4023b3126b

  • SHA1

    4e234f3864f999c7d6cd5f54e49e0b17faf94352

  • SHA256

    3c781ad13c32a5d187e983671268fe8f8fc7268434c20a1f30e9e6effa307557

  • SHA512

    895f2284419e6acf4b7ee77f843960ff49c16e74b170acb418927157d1923a1ac3c08909030a34ada8a02114b46f0df20e5bf33f7312cfde68ce7a8b11b828ad

  • SSDEEP

    3072:JXuLhLJcLQY4oimbQTxjs8/kgPj1v/xy6dm55pN/1/h/IYE:0h+goT88M1vJOJE

Malware Config

Extracted

Family

stealc

Botnet

default12

C2

http://185.172.128.170

Attributes
  • url_path

    /7043a0c6a68d9c65.php

Targets

    • Target

      3c781ad13c32a5d187e983671268fe8f8fc7268434c20a1f30e9e6effa307557

    • Size

      249KB

    • MD5

      db5c28a484a44eb2a8079d4023b3126b

    • SHA1

      4e234f3864f999c7d6cd5f54e49e0b17faf94352

    • SHA256

      3c781ad13c32a5d187e983671268fe8f8fc7268434c20a1f30e9e6effa307557

    • SHA512

      895f2284419e6acf4b7ee77f843960ff49c16e74b170acb418927157d1923a1ac3c08909030a34ada8a02114b46f0df20e5bf33f7312cfde68ce7a8b11b828ad

    • SSDEEP

      3072:JXuLhLJcLQY4oimbQTxjs8/kgPj1v/xy6dm55pN/1/h/IYE:0h+goT88M1vJOJE

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks