General

  • Target

    1temp251.exe_pw_infected.zip

  • Size

    5.3MB

  • Sample

    241104-xtzqlsvlbt

  • MD5

    634b7dbe48190127ed5ddd615eb66487

  • SHA1

    8a75f2c8f32a021d6c2fdd877e643dd59e33f826

  • SHA256

    294e7740b29b6752803a6cffb86677472b72fcb96e3011f02e25ae80af5a2695

  • SHA512

    87ba1c09c2b725cb150d3936b09c522df342fd501cbde56e484f5f03d021651b45688692821fad94427998fc27141d556456299b7332682ba184c4478b7fc526

  • SSDEEP

    98304:P8Z23grjiYiAzUv8WZgfm8eZH6Yq9bZReCL/TxffTjX/UbrgGcveOzp:P6qgrOgzegO8eZaYq9bZR5/TdTLpGcv7

Malware Config

Extracted

Family

stealc

Botnet

benjiworld29

C2

http://45.159.208.21

Attributes
  • url_path

    /e24f48bbd86dab7e.php

Targets

    • Target

      0x000b00000001e4ef-846

    • Size

      5.6MB

    • MD5

      f659a0d8ebd02ee8ee6eb70cef397cd7

    • SHA1

      78c4038cd147d6e14cb0255e7ff170d477e9eca4

    • SHA256

      307abb12c62dd8421cedfe6a11475e742caaae82faf9cb14d9812772edefe8d7

    • SHA512

      ae5275a56c782960d7d3efdd32d8458300b763114d040723b363f51dbd77ae6e371ef3d4081745feac202890284c77ddf8e796289a473eb43b998172b6eaddb9

    • SSDEEP

      98304:AUd98EKniqMUs8RVe0jHs4+b4EmeICxgHxC6qz1loJoYFqQ5dn6uqhAoCVtxnz+C:F8sn+RVJM44YCxwxmzLOFfdrq+P/xnCC

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Hijackloader family

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks