General

  • Target

    ee36582df3bb0c71543f96ac2a3f06d3fa335d97ef167f0c9931d13c9fc4a662

  • Size

    390KB

  • Sample

    240716-ffqgcaycmc

  • MD5

    121bb048c7846b254955cbd06f91b60b

  • SHA1

    89bfc6d7bdcebf2c09528fe72a92c07b244af99c

  • SHA256

    ee36582df3bb0c71543f96ac2a3f06d3fa335d97ef167f0c9931d13c9fc4a662

  • SHA512

    18141925617deb2e90f7f6f6fe2d39e02f314d9f657d77b9932de99b1c52632e74df1bf7644965c2e55094eeed46772e1b67cfa1be60816e6ff607acb22a02f5

  • SSDEEP

    6144:3pddSzppL5aUyAUCjZBLnk8OXvKptqV4z2SdHN6HTYDN0g/5yKM6Fy8cWb0DeeiS:3KpUUyOHLtqV4z/tNWg5Fy8cWbgi8LEO

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.101

Attributes
  • url_path

    /f3ee98d7eec07fb9.php

Targets

    • Target

      ee36582df3bb0c71543f96ac2a3f06d3fa335d97ef167f0c9931d13c9fc4a662

    • Size

      390KB

    • MD5

      121bb048c7846b254955cbd06f91b60b

    • SHA1

      89bfc6d7bdcebf2c09528fe72a92c07b244af99c

    • SHA256

      ee36582df3bb0c71543f96ac2a3f06d3fa335d97ef167f0c9931d13c9fc4a662

    • SHA512

      18141925617deb2e90f7f6f6fe2d39e02f314d9f657d77b9932de99b1c52632e74df1bf7644965c2e55094eeed46772e1b67cfa1be60816e6ff607acb22a02f5

    • SSDEEP

      6144:3pddSzppL5aUyAUCjZBLnk8OXvKptqV4z2SdHN6HTYDN0g/5yKM6Fy8cWb0DeeiS:3KpUUyOHLtqV4z/tNWg5Fy8cWbgi8LEO

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks