General

  • Target

    http://partyroyale.games/download

  • Sample

    240611-rva6razfra

Malware Config

Extracted

Family

stealc

Botnet

meowsterioland9

C2

http://45.132.105.156

Attributes
  • url_path

    /7872f92a21099be4.php

Targets

    • Target

      http://partyroyale.games/download

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks