General

  • Target

    b32b753d94dc0a02f097626fa793432be53d5927d30abc5490a2d44a055670e5.exe

  • Size

    9.7MB

  • Sample

    241029-da98fstelk

  • MD5

    678f666b1f2e04b504d62430f8e95b64

  • SHA1

    d8484b6da5c0faf9cb0453f12d34b3c60f03fc69

  • SHA256

    b32b753d94dc0a02f097626fa793432be53d5927d30abc5490a2d44a055670e5

  • SHA512

    5de756c864ba57302d673b4501aeb2de6d8a6e53df61fb5fcb1898608650da083a9285b78da05f72c5b7fdf1feb64a9a9aded5b953257d825883ba6b19dd0c38

  • SSDEEP

    98304:Cq+nMiEhfX/8LyyTUspbP36igWcqmfoR5zVW:i8eDqiseRa

Malware Config

Extracted

Family

stealc

Botnet

mainteam

C2

http://95.182.96.50

Attributes
  • url_path

    /2aced82320799c96.php

Targets

    • Target

      b32b753d94dc0a02f097626fa793432be53d5927d30abc5490a2d44a055670e5.exe

    • Size

      9.7MB

    • MD5

      678f666b1f2e04b504d62430f8e95b64

    • SHA1

      d8484b6da5c0faf9cb0453f12d34b3c60f03fc69

    • SHA256

      b32b753d94dc0a02f097626fa793432be53d5927d30abc5490a2d44a055670e5

    • SHA512

      5de756c864ba57302d673b4501aeb2de6d8a6e53df61fb5fcb1898608650da083a9285b78da05f72c5b7fdf1feb64a9a9aded5b953257d825883ba6b19dd0c38

    • SSDEEP

      98304:Cq+nMiEhfX/8LyyTUspbP36igWcqmfoR5zVW:i8eDqiseRa

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks