General

  • Target

    01d9ae905660461a8c57624f1bffae3e6c8643fd00c71723120fa1a383fa6c62

  • Size

    347KB

  • Sample

    241121-l3t1ya1ala

  • MD5

    251e991954be6fe306415a868e7b5fce

  • SHA1

    93f0e307ee66938de213a97ae09fd512c89635bc

  • SHA256

    01d9ae905660461a8c57624f1bffae3e6c8643fd00c71723120fa1a383fa6c62

  • SHA512

    a17de288b8096cd65a35caf8be1362171d5a255973ae7a5b8fdc3df97dbc836752b822ad2c870abfdd03b7c06ff498098ad0c391068d2ef4e6a4071bf207622d

  • SSDEEP

    6144:bSNO8OeBjZ+AvvzbgOBUZqDSDa1dV4MV/N9Ov:bEBj0AvLs4U6Wa0M39

Malware Config

Extracted

Family

stealc

Botnet

default9_cap

C2

http://62.204.41.177

Attributes
  • url_path

    /edd20096ecef326d.php

Targets

    • Target

      01d9ae905660461a8c57624f1bffae3e6c8643fd00c71723120fa1a383fa6c62

    • Size

      347KB

    • MD5

      251e991954be6fe306415a868e7b5fce

    • SHA1

      93f0e307ee66938de213a97ae09fd512c89635bc

    • SHA256

      01d9ae905660461a8c57624f1bffae3e6c8643fd00c71723120fa1a383fa6c62

    • SHA512

      a17de288b8096cd65a35caf8be1362171d5a255973ae7a5b8fdc3df97dbc836752b822ad2c870abfdd03b7c06ff498098ad0c391068d2ef4e6a4071bf207622d

    • SSDEEP

      6144:bSNO8OeBjZ+AvvzbgOBUZqDSDa1dV4MV/N9Ov:bEBj0AvLs4U6Wa0M39

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks