General

  • Target

    PartyChaos.exe.vir

  • Size

    71.3MB

  • Sample

    240804-seaqqaxgpk

  • MD5

    38dd45985cd4831fd188bdf96bfb6f25

  • SHA1

    70146ae2c0ef327af025d06525f2a05981abd3bb

  • SHA256

    a96dc0a0c3e3df948d9329d05588a61611979d8297d9b430b9b00515031f4ed4

  • SHA512

    2915194ef0c6b1133084125e454498988c0f646e20617bd7e327f565a9ca215a8d27abcac2e19b3cf3b9f9186a8abf3387f25a01ceaf01e6c564fb6201e38a84

  • SSDEEP

    1572864:fePkJopln5z3yf53NQDxe7RxS6Gec7lU2E9U+P3MVIbzRBh+fqRScMqJA:fe3pln5zQtNQDxe7Ro6Ge92ZuZ+SRScY

Malware Config

Extracted

Family

stealc

Botnet

meowsterioland3

C2

http://45.152.112.131

Attributes
  • url_path

    /8ee66a3c8f19e4b5.php

Targets

    • Target

      PartyChaos.exe.vir

    • Size

      71.3MB

    • MD5

      38dd45985cd4831fd188bdf96bfb6f25

    • SHA1

      70146ae2c0ef327af025d06525f2a05981abd3bb

    • SHA256

      a96dc0a0c3e3df948d9329d05588a61611979d8297d9b430b9b00515031f4ed4

    • SHA512

      2915194ef0c6b1133084125e454498988c0f646e20617bd7e327f565a9ca215a8d27abcac2e19b3cf3b9f9186a8abf3387f25a01ceaf01e6c564fb6201e38a84

    • SSDEEP

      1572864:fePkJopln5z3yf53NQDxe7RxS6Gec7lU2E9U+P3MVIbzRBh+fqRScMqJA:fe3pln5zQtNQDxe7Ro6Ge92ZuZ+SRScY

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Stealc

      Stealc is an infostealer written in C++.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks