General
-
Target
file.exe
-
Size
239KB
-
Sample
241120-stlrjaymht
-
MD5
da5c79183dabf3510e9c6d76f7c5c087
-
SHA1
b06a732e61d91b4e2ddc0a288f7472f1c7952271
-
SHA256
093f37a701ed0a89cb89e00cf665f26760de3a532ef97ecd5d75ce51223f932f
-
SHA512
c3fef14434ddbbcf14a4e551257376ae0a57884662f22cad24a009569c8e218839423a52d9715307f57565614699f8d66bc524c0f2ce7930a9b4bff9f12ea0ec
-
SSDEEP
3072:QmrsDjKoXngR6MJvWN3p8+sJkMRuki7ZDzUWXbhvGTPSJ08:r4DueZMFPl5IN1Dz5bePAz
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
CLOUDYTNEWS
http://31.177.109.184
-
url_path
/8331a12a495c21b2.php
Targets
-
-
Target
file.exe
-
Size
239KB
-
MD5
da5c79183dabf3510e9c6d76f7c5c087
-
SHA1
b06a732e61d91b4e2ddc0a288f7472f1c7952271
-
SHA256
093f37a701ed0a89cb89e00cf665f26760de3a532ef97ecd5d75ce51223f932f
-
SHA512
c3fef14434ddbbcf14a4e551257376ae0a57884662f22cad24a009569c8e218839423a52d9715307f57565614699f8d66bc524c0f2ce7930a9b4bff9f12ea0ec
-
SSDEEP
3072:QmrsDjKoXngR6MJvWN3p8+sJkMRuki7ZDzUWXbhvGTPSJ08:r4DueZMFPl5IN1Dz5bePAz
-
Stealc family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4