General

  • Target

    66fbc128c741b0d895e723e7ef1bc7f2a953beda60cbebf55b8f8139926d4849.exe

  • Size

    493KB

  • Sample

    241010-hn7rpswcmj

  • MD5

    9d12c4ebf544f59c5778b070defbe130

  • SHA1

    7bd747844eab8ff263b75ace7537c8b7d163e20d

  • SHA256

    66fbc128c741b0d895e723e7ef1bc7f2a953beda60cbebf55b8f8139926d4849

  • SHA512

    a20b043bbbccde6a8551ecad395d705707afc83516465b5ffaae258e4a22b4782760f1ae59b9612764b47fe339ed0de0b73e302bbc0e25b0f910aee533213997

  • SSDEEP

    12288:C/l9sitPVq0+PC7yuotJWyCi3vS9J1LHyh8mr5W5Eeo4S:CsitS4FkJWye9J1sJ5W57p

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://46.8.231.109

Attributes
  • url_path

    /c4754d4f680ead72.php

Targets

    • Target

      66fbc128c741b0d895e723e7ef1bc7f2a953beda60cbebf55b8f8139926d4849.exe

    • Size

      493KB

    • MD5

      9d12c4ebf544f59c5778b070defbe130

    • SHA1

      7bd747844eab8ff263b75ace7537c8b7d163e20d

    • SHA256

      66fbc128c741b0d895e723e7ef1bc7f2a953beda60cbebf55b8f8139926d4849

    • SHA512

      a20b043bbbccde6a8551ecad395d705707afc83516465b5ffaae258e4a22b4782760f1ae59b9612764b47fe339ed0de0b73e302bbc0e25b0f910aee533213997

    • SSDEEP

      12288:C/l9sitPVq0+PC7yuotJWyCi3vS9J1LHyh8mr5W5Eeo4S:CsitS4FkJWye9J1sJ5W57p

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks