General

  • Target

    cstealer.exe

  • Size

    16.2MB

  • Sample

    241011-1yvt1awepg

  • MD5

    4882882da9e24e50203ef491b9f83f69

  • SHA1

    5d1814325d0a0e8c8e6345544cbcba6938ce33b7

  • SHA256

    678ac60f3bd78798b460efb96ff4b779c1736fd2f64e9a6281859f69cef66c95

  • SHA512

    c11c0dd0cd330f7b57d6e90bb178428878912dc759fc1c3b49958e3c39a690ca6e09b5207ad44bf6d0d345bac273584fe0a2aabfb8ec0df7e4f32876f5466dc7

  • SSDEEP

    393216:oEkeCi/VEbQhZ2YsHFUK2J7XMCHWUjxjx5WsqWxTXlTB5ajNYtf:oGCiNEbQZ2YwUlJ7XMb8csqAsjN

Malware Config

Targets

    • Target

      cstealer.exe

    • Size

      16.2MB

    • MD5

      4882882da9e24e50203ef491b9f83f69

    • SHA1

      5d1814325d0a0e8c8e6345544cbcba6938ce33b7

    • SHA256

      678ac60f3bd78798b460efb96ff4b779c1736fd2f64e9a6281859f69cef66c95

    • SHA512

      c11c0dd0cd330f7b57d6e90bb178428878912dc759fc1c3b49958e3c39a690ca6e09b5207ad44bf6d0d345bac273584fe0a2aabfb8ec0df7e4f32876f5466dc7

    • SSDEEP

      393216:oEkeCi/VEbQhZ2YsHFUK2J7XMCHWUjxjx5WsqWxTXlTB5ajNYtf:oGCiNEbQZ2YwUlJ7XMb8csqAsjN

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks