General

  • Target

    updateload.exe

  • Size

    3.1MB

  • Sample

    240805-gmmvgasekb

  • MD5

    4c5dbf388f5de761e45f268186f8be27

  • SHA1

    918b198ad13af4c52b4518ff22a2a032e86e3679

  • SHA256

    92a218b4b6cbd696cb07698a2da0fc8578ad1f966a88509e25db827fe85a2920

  • SHA512

    4f9331107ec172cd3caa767a2af3e9f18e85ccf71b725be4bfbb0e83dcaf40d8e10581531a709227a6135efae8531a9d55bc22b32c0a8eaafdd8adc4c736dc94

  • SSDEEP

    49152:DUvC/MTQYNsWy9aRV0NmZfClF/sKkTUD6CsRBJgsoDDeA:IjTQYNsWy6FClFUKkwWRBSpDDeA

Malware Config

Extracted

Family

stealc

Botnet

meowsterioland4

C2

http://45.152.112.131

Attributes
  • url_path

    /8ee66a3c8f19e4b5.php

Targets

    • Target

      updateload.exe

    • Size

      3.1MB

    • MD5

      4c5dbf388f5de761e45f268186f8be27

    • SHA1

      918b198ad13af4c52b4518ff22a2a032e86e3679

    • SHA256

      92a218b4b6cbd696cb07698a2da0fc8578ad1f966a88509e25db827fe85a2920

    • SHA512

      4f9331107ec172cd3caa767a2af3e9f18e85ccf71b725be4bfbb0e83dcaf40d8e10581531a709227a6135efae8531a9d55bc22b32c0a8eaafdd8adc4c736dc94

    • SSDEEP

      49152:DUvC/MTQYNsWy9aRV0NmZfClF/sKkTUD6CsRBJgsoDDeA:IjTQYNsWy6FClFUKkwWRBSpDDeA

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Stealc

      Stealc is an infostealer written in C++.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Deletes itself

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks