General

  • Target

    be6c6efc46ddfa7aaeb3619d3469457c2d38ba1c7f84a456d5d7e4a9f598caab

  • Size

    342KB

  • Sample

    241121-xxcp9azjhl

  • MD5

    f872c4b67deb6d533f5c0b40bf2775ba

  • SHA1

    9180999c22e135a66aa12a45d2a74839f549156f

  • SHA256

    be6c6efc46ddfa7aaeb3619d3469457c2d38ba1c7f84a456d5d7e4a9f598caab

  • SHA512

    555fd220929c54e18264847582cf83c46c251cb02e584386457a4ad87bbddeafe96f01dd88acf20ee48ee5070771e99a5d9b08c9c90b490aabe44d8df714305d

  • SSDEEP

    6144:BTLARf0l3Ma1b35uzAxawSGIe/3T9/LI3Dcl3PeCfk:JMR8dZ35uzAxdSGI23T9DooFW

Malware Config

Extracted

Family

stealc

Botnet

default9_cap

C2

http://62.204.41.177

Attributes
  • url_path

    /edd20096ecef326d.php

Targets

    • Target

      be6c6efc46ddfa7aaeb3619d3469457c2d38ba1c7f84a456d5d7e4a9f598caab

    • Size

      342KB

    • MD5

      f872c4b67deb6d533f5c0b40bf2775ba

    • SHA1

      9180999c22e135a66aa12a45d2a74839f549156f

    • SHA256

      be6c6efc46ddfa7aaeb3619d3469457c2d38ba1c7f84a456d5d7e4a9f598caab

    • SHA512

      555fd220929c54e18264847582cf83c46c251cb02e584386457a4ad87bbddeafe96f01dd88acf20ee48ee5070771e99a5d9b08c9c90b490aabe44d8df714305d

    • SSDEEP

      6144:BTLARf0l3Ma1b35uzAxawSGIe/3T9/LI3Dcl3PeCfk:JMR8dZ35uzAxdSGI23T9DooFW

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks