General

  • Target

    1temp251.exe_pw_infected.zip

  • Size

    5.3MB

  • Sample

    241104-xtzqlsvlbt

  • MD5

    634b7dbe48190127ed5ddd615eb66487

  • SHA1

    8a75f2c8f32a021d6c2fdd877e643dd59e33f826

  • SHA256

    294e7740b29b6752803a6cffb86677472b72fcb96e3011f02e25ae80af5a2695

  • SHA512

    87ba1c09c2b725cb150d3936b09c522df342fd501cbde56e484f5f03d021651b45688692821fad94427998fc27141d556456299b7332682ba184c4478b7fc526

  • SSDEEP

    98304:P8Z23grjiYiAzUv8WZgfm8eZH6Yq9bZReCL/TxffTjX/UbrgGcveOzp:P6qgrOgzegO8eZaYq9bZR5/TdTLpGcv7

Malware Config

Extracted

Family

stealc

Botnet

benjiworld29

C2

http://45.159.208.21

Attributes
  • url_path

    /e24f48bbd86dab7e.php

Targets

    • Target

      0x000b00000001e4ef-846

    • Size

      5.6MB

    • MD5

      f659a0d8ebd02ee8ee6eb70cef397cd7

    • SHA1

      78c4038cd147d6e14cb0255e7ff170d477e9eca4

    • SHA256

      307abb12c62dd8421cedfe6a11475e742caaae82faf9cb14d9812772edefe8d7

    • SHA512

      ae5275a56c782960d7d3efdd32d8458300b763114d040723b363f51dbd77ae6e371ef3d4081745feac202890284c77ddf8e796289a473eb43b998172b6eaddb9

    • SSDEEP

      98304:AUd98EKniqMUs8RVe0jHs4+b4EmeICxgHxC6qz1loJoYFqQ5dn6uqhAoCVtxnz+C:F8sn+RVJM44YCxwxmzLOFfdrq+P/xnCC

    • Detects HijackLoader (aka IDAT Loader)

    • HijackLoader

      HijackLoader is a multistage loader first seen in 2023.

    • Hijackloader family

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Deletes itself

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.