General

  • Target

    c9ff2801dded32de57dcfa9922c06fb72591040f1ed64ed228e5926f147544c9

  • Size

    1.6MB

  • Sample

    240602-lavrrshf92

  • MD5

    a94cf44b1371841841f5c3932038f38a

  • SHA1

    1297bc04b5af6136dcf3951844bd5477f78f56d0

  • SHA256

    c9ff2801dded32de57dcfa9922c06fb72591040f1ed64ed228e5926f147544c9

  • SHA512

    7eab2eace4e53bf7f63d35f7886bde50411596d3e964324b47817a78795b0e5818b6e58a30f04ddab55d004d8c46b037797817cd2fe035c440a7e223ce7b756f

  • SSDEEP

    49152:skTq24GjdGSiqkqXfd+/9AqYanieKdsy:s1EjdGSiqkqXf0FLYW

Score
10/10

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1246744609506201672/hf0mn5sfqMQPf6SMyKIYJ8eZeUJB29FUHxPVgoINxglDNVOq7piJX5Um26b_zeWmSzu8

Targets

    • Target

      c9ff2801dded32de57dcfa9922c06fb72591040f1ed64ed228e5926f147544c9

    • Size

      1.6MB

    • MD5

      a94cf44b1371841841f5c3932038f38a

    • SHA1

      1297bc04b5af6136dcf3951844bd5477f78f56d0

    • SHA256

      c9ff2801dded32de57dcfa9922c06fb72591040f1ed64ed228e5926f147544c9

    • SHA512

      7eab2eace4e53bf7f63d35f7886bde50411596d3e964324b47817a78795b0e5818b6e58a30f04ddab55d004d8c46b037797817cd2fe035c440a7e223ce7b756f

    • SSDEEP

      49152:skTq24GjdGSiqkqXfd+/9AqYanieKdsy:s1EjdGSiqkqXf0FLYW

    Score
    10/10
    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks