General
-
Target
Stealer2-main.zip
-
Size
17.7MB
-
Sample
241117-rks9kswmal
-
MD5
1b2b6077a94229bb2046ebbd84825da8
-
SHA1
e4618e261f971f4898380627f10f46c8e965515b
-
SHA256
a3e238c0b2fe1a403ee3741984c4a888bf0a4119e8d57bea727851d1857ec4d4
-
SHA512
289004e29f82dc286337209f1dfb902b08ffbae669f7f1f60fc5c0f3c61dbea2473af34ca82bb910d6b69851b5ad4fb6de171460313551608c3e925b42518216
-
SSDEEP
393216:2IplDL59rUAlHkY7Gi7RUe+XFiF6FRq9yLztfS6:HpJL51UAWSyXFBPYyFS6
Behavioral task
behavioral1
Sample
Stealer2-main/loader.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Stealer2-main/loader.exe
-
Size
17.9MB
-
MD5
1dea6550a40cfb877eeb45cce80648f8
-
SHA1
87dc0d57ce6bf7b8ece5a8446cb5aa692d4e9089
-
SHA256
6b5eb6a08521e341d937deb82c13e474fddaa93b7dcf7299df0807aaece2b278
-
SHA512
ee8e41d101286a1b88749afa3dd238d573d5251d73bb532c49e034d940c78d754e7da78f5ebf3692260f493423e1ea1d880a102a0df0922ec47fc3e86dbe3c54
-
SSDEEP
393216:zqPnLFXlrsQMDOETgsvfGKlgwAAdvEhJbrgBurqo:2PLFXNsQREVPAAyvfgNo
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1