General

  • Target

    65ae23376b2d1179fac3bb74e5d5258f0aa1d06ef0726544c9bddadc58d11b80.exe

  • Size

    239KB

  • Sample

    241121-f3lfxazdln

  • MD5

    40163eae38af01040691454b24b06e2f

  • SHA1

    53eca8666143b17066b0c84d7087c570f6c18d57

  • SHA256

    65ae23376b2d1179fac3bb74e5d5258f0aa1d06ef0726544c9bddadc58d11b80

  • SHA512

    008a1755311b2efb1ae843a69dc0b20376b3fc8e989fd6d9e6f49612d7cc6b5b0dc26434a3f508d74b116b2d6c4e383a97a84686b74bd4d5436bfb297a23f86e

  • SSDEEP

    3072:vmrsDjKoXngR6sJvWN3pEOsJkMRuki7ZDzUWXPj857J08:O4DueZsFX15IN1Dz5PjEtz

Malware Config

Extracted

Family

stealc

Botnet

default11

C2

http://62.204.41.163

Attributes
  • url_path

    /16fa04073490929d.php

Targets

    • Target

      65ae23376b2d1179fac3bb74e5d5258f0aa1d06ef0726544c9bddadc58d11b80.exe

    • Size

      239KB

    • MD5

      40163eae38af01040691454b24b06e2f

    • SHA1

      53eca8666143b17066b0c84d7087c570f6c18d57

    • SHA256

      65ae23376b2d1179fac3bb74e5d5258f0aa1d06ef0726544c9bddadc58d11b80

    • SHA512

      008a1755311b2efb1ae843a69dc0b20376b3fc8e989fd6d9e6f49612d7cc6b5b0dc26434a3f508d74b116b2d6c4e383a97a84686b74bd4d5436bfb297a23f86e

    • SSDEEP

      3072:vmrsDjKoXngR6sJvWN3pEOsJkMRuki7ZDzUWXPj857J08:O4DueZsFX15IN1Dz5PjEtz

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks