General

  • Target

    ChaosSetup.exe

  • Size

    71.8MB

  • Sample

    240805-fqfpwsxenp

  • MD5

    0adda0bd6d5d8cb1ac717dfd0d521c20

  • SHA1

    2ced9e2330b482a33bc3c80198286eb27b7dd301

  • SHA256

    d420dc452be937c7c558738cc9e06c7e04241dfaaaed875adfdc7e41daa89969

  • SHA512

    35d40ae3787484df3ab887d9dcd121d7d0f74f7393df28204b855ece195b8e74d86c6d8d97b1befa9d71ba52d1268ed36ab04927211a7d9b7b0de099eb21b863

  • SSDEEP

    1572864:dPPkJopntj5NdTHY4UfBbAnQjgSBLPm1wr/o6Lplupca3yf5dqL:dP3pntj5NotsQMOeqr/o6Lp4caQCL

Malware Config

Extracted

Family

stealc

Botnet

meowsterioland4

C2

http://45.152.112.131

Attributes
  • url_path

    /8ee66a3c8f19e4b5.php

Targets

    • Target

      ChaosSetup.exe

    • Size

      71.8MB

    • MD5

      0adda0bd6d5d8cb1ac717dfd0d521c20

    • SHA1

      2ced9e2330b482a33bc3c80198286eb27b7dd301

    • SHA256

      d420dc452be937c7c558738cc9e06c7e04241dfaaaed875adfdc7e41daa89969

    • SHA512

      35d40ae3787484df3ab887d9dcd121d7d0f74f7393df28204b855ece195b8e74d86c6d8d97b1befa9d71ba52d1268ed36ab04927211a7d9b7b0de099eb21b863

    • SSDEEP

      1572864:dPPkJopntj5NdTHY4UfBbAnQjgSBLPm1wr/o6Lplupca3yf5dqL:dP3pntj5NotsQMOeqr/o6Lp4caQCL

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Rhadamanthys

      Rhadamanthys is an info stealer written in C++ first seen in August 2022.

    • Stealc

      Stealc is an infostealer written in C++.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks