General
-
Target
pic5.jpg
-
Size
1.5MB
-
Sample
241121-p4dxwswran
-
MD5
0b66bb8eb0bc59bb965c0ee45355f69f
-
SHA1
26e26c34955b16eeed5c8173f2ac918e127494bb
-
SHA256
c43f2f29df4960f5a64d9b28d4746b40d5e0bdcb9dc2fbc9d75c4050f22be272
-
SHA512
aad9592605724a6973bde97c799afcfd91e2f5bb02611f6e9ea339f8fdbd89c1ea7bca3e8fa5811619e29fd5fa0d52cf6b2dca95800df583d8a9d59fc9d1531f
-
SSDEEP
24576:GRvHTiBHPLRify9A5dmdeH2j0RSzh/hCVZ5QP4z/24zKpCZFRAT7Sf:q8jRbm5dz/gBqWP4/24uEk
Static task
static1
Behavioral task
behavioral1
Sample
pic5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
pic5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
LogsDiller1
http://109.107.157.132
-
url_path
/7a5d4e643b804e99.php
Targets
-
-
Target
pic5.jpg
-
Size
1.5MB
-
MD5
0b66bb8eb0bc59bb965c0ee45355f69f
-
SHA1
26e26c34955b16eeed5c8173f2ac918e127494bb
-
SHA256
c43f2f29df4960f5a64d9b28d4746b40d5e0bdcb9dc2fbc9d75c4050f22be272
-
SHA512
aad9592605724a6973bde97c799afcfd91e2f5bb02611f6e9ea339f8fdbd89c1ea7bca3e8fa5811619e29fd5fa0d52cf6b2dca95800df583d8a9d59fc9d1531f
-
SSDEEP
24576:GRvHTiBHPLRify9A5dmdeH2j0RSzh/hCVZ5QP4z/24zKpCZFRAT7Sf:q8jRbm5dz/gBqWP4/24uEk
-
Stealc family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2