General

  • Target

    130865cc70a14aae222de6d9a2f882de.exe

  • Size

    835KB

  • Sample

    240723-jktw4swaqn

  • MD5

    130865cc70a14aae222de6d9a2f882de

  • SHA1

    b12c29bdce09482f1c4175507c39ea627323a79c

  • SHA256

    d1d6d688c530ecfc93da7cdf372b63a928747c85498669b519d1ac0dd1ec691e

  • SHA512

    b7741e56db0db5fb33efa0964a3c25b03c0c09dbe99acc80e5b7c454d96ae790a5f66c12d02dce131843cd803f10f558ad965e0950a4b983270f47675e612467

  • SSDEEP

    24576:pYOArtsJZ1vktezSj3sK31bxlS2XQNmtHpXG:p1JZ1vkteEPxw2XWmxE

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.152

Attributes
  • url_path

    /3c829f930578d648.php

Targets

    • Target

      130865cc70a14aae222de6d9a2f882de.exe

    • Size

      835KB

    • MD5

      130865cc70a14aae222de6d9a2f882de

    • SHA1

      b12c29bdce09482f1c4175507c39ea627323a79c

    • SHA256

      d1d6d688c530ecfc93da7cdf372b63a928747c85498669b519d1ac0dd1ec691e

    • SHA512

      b7741e56db0db5fb33efa0964a3c25b03c0c09dbe99acc80e5b7c454d96ae790a5f66c12d02dce131843cd803f10f558ad965e0950a4b983270f47675e612467

    • SSDEEP

      24576:pYOArtsJZ1vktezSj3sK31bxlS2XQNmtHpXG:p1JZ1vkteEPxw2XWmxE

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks