General

  • Target

    31b97502d845aece8c21c6afefa177012a78988de6958fa5b4cb970b77484a08

  • Size

    369KB

  • Sample

    240723-szdccazemb

  • MD5

    2bc40b5d48284a5ce0cf08ed9aa9af51

  • SHA1

    28a2152ae15fb0be648801875da12e0d4dddbfb0

  • SHA256

    31b97502d845aece8c21c6afefa177012a78988de6958fa5b4cb970b77484a08

  • SHA512

    2d4e030a447dc85803f50c4c3845de1916e5807eb970809e16ec7fbfcca2ab747678ba9925015e56f8ea505057fb09113928a30495814ba58fd45303f92a11bb

  • SSDEEP

    6144:66GIXF3uwuhDo72LiYn4QWwyudL5Y8qKWKAtuMCiC+wsjkmKWglVzmhz:66FpBuyG/l5YvKktGiCyYXZg

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.152

Attributes
  • url_path

    /3c829f930578d648.php

Targets

    • Target

      31b97502d845aece8c21c6afefa177012a78988de6958fa5b4cb970b77484a08

    • Size

      369KB

    • MD5

      2bc40b5d48284a5ce0cf08ed9aa9af51

    • SHA1

      28a2152ae15fb0be648801875da12e0d4dddbfb0

    • SHA256

      31b97502d845aece8c21c6afefa177012a78988de6958fa5b4cb970b77484a08

    • SHA512

      2d4e030a447dc85803f50c4c3845de1916e5807eb970809e16ec7fbfcca2ab747678ba9925015e56f8ea505057fb09113928a30495814ba58fd45303f92a11bb

    • SSDEEP

      6144:66GIXF3uwuhDo72LiYn4QWwyudL5Y8qKWKAtuMCiC+wsjkmKWglVzmhz:66FpBuyG/l5YvKktGiCyYXZg

    • Stealc

      Stealc is an infostealer written in C++.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks