General

  • Target

    78bec82769e98d1a688ecabfb4dc822d2ae1068105e06de16420dbaa4512bc75

  • Size

    834KB

  • Sample

    240723-k3xw6axhkf

  • MD5

    cecd9912d3c9f3d1dacb7ff3c5ab97da

  • SHA1

    78d0448df234ebc967c238ceb7ed7e6b67da9d08

  • SHA256

    78bec82769e98d1a688ecabfb4dc822d2ae1068105e06de16420dbaa4512bc75

  • SHA512

    19861b31b7b9ae9a65b1d05512009f5f02a80447e9273c021ee33b3ced23e1faacec3120069249541fbd3e3e0610cebcb28cdc01110d543669e6ef4cb3e3ed1b

  • SSDEEP

    24576:gl+ArtsJJV/ENOB2y3cK31LxVSGGd6yxdZho:g+JJV/ENO/vxgGGnbfo

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.152

Attributes
  • url_path

    /3c829f930578d648.php

Targets

    • Target

      78bec82769e98d1a688ecabfb4dc822d2ae1068105e06de16420dbaa4512bc75

    • Size

      834KB

    • MD5

      cecd9912d3c9f3d1dacb7ff3c5ab97da

    • SHA1

      78d0448df234ebc967c238ceb7ed7e6b67da9d08

    • SHA256

      78bec82769e98d1a688ecabfb4dc822d2ae1068105e06de16420dbaa4512bc75

    • SHA512

      19861b31b7b9ae9a65b1d05512009f5f02a80447e9273c021ee33b3ced23e1faacec3120069249541fbd3e3e0610cebcb28cdc01110d543669e6ef4cb3e3ed1b

    • SSDEEP

      24576:gl+ArtsJJV/ENOB2y3cK31LxVSGGd6yxdZho:g+JJV/ENO/vxgGGnbfo

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks