General

  • Target

    SyncSpoofer.exe

  • Size

    4.5MB

  • Sample

    241009-19exxszdne

  • MD5

    a83ef3022abbf90408e3d524f1aa7a8b

  • SHA1

    d871478b0d72d51ab3d3325bf45688a9c0c5efd5

  • SHA256

    24d5a4217ca7cbac8b0d33663c7eac767c0248ed2e83c42ac242fd7b9007d42f

  • SHA512

    361cce9ad65fd939a3e78d150931dd468ddacba99b5ba148ba3799ceb2b2ec00904a769601d076d81218d4b732cd82210f88a714418261ad2edce02619ff3293

  • SSDEEP

    98304:uEnVwl1p8jfC2ajXVRONMJ/A2CQsHXst4R6D:12v8ja1WNMhA1Cd

Malware Config

Extracted

Family

stealc

Botnet

soft

C2

http://193.233.112.44

Attributes
  • url_path

    /383ccd496f3c5eee.php

Targets

    • Target

      SyncSpoofer.exe

    • Size

      4.5MB

    • MD5

      a83ef3022abbf90408e3d524f1aa7a8b

    • SHA1

      d871478b0d72d51ab3d3325bf45688a9c0c5efd5

    • SHA256

      24d5a4217ca7cbac8b0d33663c7eac767c0248ed2e83c42ac242fd7b9007d42f

    • SHA512

      361cce9ad65fd939a3e78d150931dd468ddacba99b5ba148ba3799ceb2b2ec00904a769601d076d81218d4b732cd82210f88a714418261ad2edce02619ff3293

    • SSDEEP

      98304:uEnVwl1p8jfC2ajXVRONMJ/A2CQsHXst4R6D:12v8ja1WNMhA1Cd

    • Stealc

      Stealc is an infostealer written in C++.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks