General

  • Target

    PartyWorld Installer 1.2.5.exe

  • Size

    71.2MB

  • Sample

    240804-l3teeasfrn

  • MD5

    214cf483418754fb5acba4c4ca8bc1fa

  • SHA1

    2a644cff8677889e76da162384a6b1adc0d3a7d0

  • SHA256

    fa42b482ed204e60562c9397af12080614e628fdaef6b654a7b65d778ce30d51

  • SHA512

    482e11bbb2e81500956f2ba7c6b97fc27e564b3a3c1c42ffe3542241fa35be1d1eb595639a6c69e53cc392fc510a2e575c0a66679166a5f024b44aeaf7e315d4

  • SSDEEP

    1572864:q0PkJop2/RiM3yf5i8wuiNwiwj3CT3JCO+IsuzW0u5KkkgcMqd:q03p2/RbQ25Nwhj30Jf1NCKrgc5d

Malware Config

Extracted

Family

stealc

Botnet

meowsterioland3

C2

http://45.152.112.131

Attributes
  • url_path

    /8ee66a3c8f19e4b5.php

Targets

    • Target

      PartyWorld Installer 1.2.5.exe

    • Size

      71.2MB

    • MD5

      214cf483418754fb5acba4c4ca8bc1fa

    • SHA1

      2a644cff8677889e76da162384a6b1adc0d3a7d0

    • SHA256

      fa42b482ed204e60562c9397af12080614e628fdaef6b654a7b65d778ce30d51

    • SHA512

      482e11bbb2e81500956f2ba7c6b97fc27e564b3a3c1c42ffe3542241fa35be1d1eb595639a6c69e53cc392fc510a2e575c0a66679166a5f024b44aeaf7e315d4

    • SSDEEP

      1572864:q0PkJop2/RiM3yf5i8wuiNwiwj3CT3JCO+IsuzW0u5KkkgcMqd:q03p2/RbQ25Nwhj30Jf1NCKrgc5d

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Stealc

      Stealc is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks