General

  • Target

    file.exe

  • Size

    2.4MB

  • Sample

    240711-ahq8rszhje

  • MD5

    329916de2caafba4344911bd2ca04740

  • SHA1

    12d9d708ccbce1890efac78b1296c72e3f4fa6dd

  • SHA256

    7614f3191e218056402bb21b5349f37435d986f7d81954555d6b776df808b18e

  • SHA512

    81f93b8f5ae720fd726b7a797b2cc9326942821e42244cb30c4a0140ca4299fc4e24df64720ca6871b31e936db7bfaa66c661ebaf4dbff311aa6f713f2ca132f

  • SSDEEP

    49152:oyIX/s7XvoFv+Qm9Kyj04TZXXdRvsz2VwLW2CPdULs:ofYvYv+7VNdRve2Vwyi

Malware Config

Extracted

Family

stealc

Botnet

hate

C2

http://85.28.47.30

Attributes
  • url_path

    /920475a59bac849d.php

Targets

    • Target

      file.exe

    • Size

      2.4MB

    • MD5

      329916de2caafba4344911bd2ca04740

    • SHA1

      12d9d708ccbce1890efac78b1296c72e3f4fa6dd

    • SHA256

      7614f3191e218056402bb21b5349f37435d986f7d81954555d6b776df808b18e

    • SHA512

      81f93b8f5ae720fd726b7a797b2cc9326942821e42244cb30c4a0140ca4299fc4e24df64720ca6871b31e936db7bfaa66c661ebaf4dbff311aa6f713f2ca132f

    • SSDEEP

      49152:oyIX/s7XvoFv+Qm9Kyj04TZXXdRvsz2VwLW2CPdULs:ofYvYv+7VNdRve2Vwyi

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks