General

  • Target

    82ebec3391c43c860cf1950e342cee1b4a55f2540ba7cc2ca768bf570f1bf1c1

  • Size

    2.5MB

  • Sample

    240807-kdts7syema

  • MD5

    0a59357ee50c8272be24168abcd09fca

  • SHA1

    2f35f3dedf5b11e595e2cb9cbc036859313c1a3b

  • SHA256

    82ebec3391c43c860cf1950e342cee1b4a55f2540ba7cc2ca768bf570f1bf1c1

  • SHA512

    fd3549eaa2b07b241f7bbe205802bec12d5b4c71187122092d56b5026cd24b4fc5702dedbb6edf4c6fe43841001f41c785b394027eba034483e503b7888fb17e

  • SSDEEP

    49152:LEKniSMiiFSa+u36JVlxYh520XSyBuMJYFmBNivrmcwV2KFb1jReu5QIUEQkodoz:QKiSMiYOVlxsjJYINErRwoKb191QIUEz

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://185.215.113.24

Attributes
  • url_path

    /e2b1563c6670f193.php

Targets

    • Target

      82ebec3391c43c860cf1950e342cee1b4a55f2540ba7cc2ca768bf570f1bf1c1

    • Size

      2.5MB

    • MD5

      0a59357ee50c8272be24168abcd09fca

    • SHA1

      2f35f3dedf5b11e595e2cb9cbc036859313c1a3b

    • SHA256

      82ebec3391c43c860cf1950e342cee1b4a55f2540ba7cc2ca768bf570f1bf1c1

    • SHA512

      fd3549eaa2b07b241f7bbe205802bec12d5b4c71187122092d56b5026cd24b4fc5702dedbb6edf4c6fe43841001f41c785b394027eba034483e503b7888fb17e

    • SSDEEP

      49152:LEKniSMiiFSa+u36JVlxYh520XSyBuMJYFmBNivrmcwV2KFb1jReu5QIUEQkodoz:QKiSMiYOVlxsjJYINErRwoKb191QIUEz

    • Stealc

      Stealc is an infostealer written in C++.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks