General

  • Target

    snss1.bin.exe

  • Size

    1.4MB

  • Sample

    240804-kec7va1cnj

  • MD5

    a9028986ba7f28ed266357a8e9433b2c

  • SHA1

    d2a748f321863c02301575e9404b704f868b2cd6

  • SHA256

    972581c7a8ab22bea81a7a36297b45c5e1c0ee3321fbe4ec34df4bd8edd42654

  • SHA512

    959691e5ecf2c4bb97b27e9fac7aa5997d32ad54fb214254b0b7d66cbe6bd2521258a408e59b771eaf4b2a0e40f9ab4c833c866d0eea323d4f5c82f246168429

  • SSDEEP

    24576:jObekFskfohrP337uzHnA6cHswHEnq6gUT5C7TbFwO16HVOQaZiHfnB6n5wldRcT:jO63lrP337uzHnA6cMcVm8TyO161GZiC

Malware Config

Extracted

Family

stealc

Botnet

vor2

C2

http://45.152.112.103

Attributes
  • url_path

    /1cf3aa1810feeb67.php

Targets

    • Target

      snss1.bin.exe

    • Size

      1.4MB

    • MD5

      a9028986ba7f28ed266357a8e9433b2c

    • SHA1

      d2a748f321863c02301575e9404b704f868b2cd6

    • SHA256

      972581c7a8ab22bea81a7a36297b45c5e1c0ee3321fbe4ec34df4bd8edd42654

    • SHA512

      959691e5ecf2c4bb97b27e9fac7aa5997d32ad54fb214254b0b7d66cbe6bd2521258a408e59b771eaf4b2a0e40f9ab4c833c866d0eea323d4f5c82f246168429

    • SSDEEP

      24576:jObekFskfohrP337uzHnA6cHswHEnq6gUT5C7TbFwO16HVOQaZiHfnB6n5wldRcT:jO63lrP337uzHnA6cMcVm8TyO161GZiC

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Stealc

      Stealc is an infostealer written in C++.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks