General

  • Target

    file.exe

  • Size

    503KB

  • Sample

    241121-1zpz5syjgz

  • MD5

    926dd9e88e2ac846eaf3c23ef8208cdf

  • SHA1

    95e642c98048b718b948425e39a746d66d0dd4db

  • SHA256

    ad277a48c7c67f5510e0d2b28284f631f9e51dd7da53ed9e4da8dec0078d9aa0

  • SHA512

    ff5c31b9ffe58b88983ba2c2f8f2195c454fe69f05a9d5a40aa90227461fb3a1994c778b026a723715ab5d3664702f47df84336afd5b495cd258a1514f75eb30

  • SSDEEP

    12288:sA4gyTSwAN2kL0PPJHBlOyLwFrpOu6VSlC8OIlr7v:sxgFN2kL03HlpLwFrpOu6qC83r7v

Malware Config

Extracted

Family

stealc

Botnet

LogsDiller1

C2

http://109.107.157.132

Attributes
  • url_path

    /7a5d4e643b804e99.php

Targets

    • Target

      file.exe

    • Size

      503KB

    • MD5

      926dd9e88e2ac846eaf3c23ef8208cdf

    • SHA1

      95e642c98048b718b948425e39a746d66d0dd4db

    • SHA256

      ad277a48c7c67f5510e0d2b28284f631f9e51dd7da53ed9e4da8dec0078d9aa0

    • SHA512

      ff5c31b9ffe58b88983ba2c2f8f2195c454fe69f05a9d5a40aa90227461fb3a1994c778b026a723715ab5d3664702f47df84336afd5b495cd258a1514f75eb30

    • SSDEEP

      12288:sA4gyTSwAN2kL0PPJHBlOyLwFrpOu6VSlC8OIlr7v:sxgFN2kL03HlpLwFrpOu6qC83r7v

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks