General

  • Target

    Stealer2-main.zip

  • Size

    17.7MB

  • Sample

    241117-rks9kswmal

  • MD5

    1b2b6077a94229bb2046ebbd84825da8

  • SHA1

    e4618e261f971f4898380627f10f46c8e965515b

  • SHA256

    a3e238c0b2fe1a403ee3741984c4a888bf0a4119e8d57bea727851d1857ec4d4

  • SHA512

    289004e29f82dc286337209f1dfb902b08ffbae669f7f1f60fc5c0f3c61dbea2473af34ca82bb910d6b69851b5ad4fb6de171460313551608c3e925b42518216

  • SSDEEP

    393216:2IplDL59rUAlHkY7Gi7RUe+XFiF6FRq9yLztfS6:HpJL51UAWSyXFBPYyFS6

Malware Config

Targets

    • Target

      Stealer2-main/loader.exe

    • Size

      17.9MB

    • MD5

      1dea6550a40cfb877eeb45cce80648f8

    • SHA1

      87dc0d57ce6bf7b8ece5a8446cb5aa692d4e9089

    • SHA256

      6b5eb6a08521e341d937deb82c13e474fddaa93b7dcf7299df0807aaece2b278

    • SHA512

      ee8e41d101286a1b88749afa3dd238d573d5251d73bb532c49e034d940c78d754e7da78f5ebf3692260f493423e1ea1d880a102a0df0922ec47fc3e86dbe3c54

    • SSDEEP

      393216:zqPnLFXlrsQMDOETgsvfGKlgwAAdvEhJbrgBurqo:2PLFXNsQREVPAAyvfgNo

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks