General

  • Target

    27267ef964c6a63e33899a21fd121e78.exe

  • Size

    3.7MB

  • Sample

    241202-pl59estkbz

  • MD5

    27267ef964c6a63e33899a21fd121e78

  • SHA1

    d08d9ed964bec7ce311ab9397b183ff92434b014

  • SHA256

    c0a8b772975259c3689d7fb83369fd211666217b7fb79192551851e8a6390b26

  • SHA512

    0956e365f70411a78b81b91f88ae4eec64b1704d05d1de4120edf97b79c4bc1206f93bb35eceffbaef5479cd491a818a896926cfb4f68897129f9c4accec92db

  • SSDEEP

    49152:4vKWgICXIs3zby2amZ+Vc/9HKGuMLDgtwe5EnvNtorahDx6+ZT41g85eOU8BPRV3:4Cz1RaUBKxtpivLf5Z41CqRVMU/

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://91.215.85.11

Attributes
  • url_path

    /36d502da19ed71e2.php

Targets

    • Target

      27267ef964c6a63e33899a21fd121e78.exe

    • Size

      3.7MB

    • MD5

      27267ef964c6a63e33899a21fd121e78

    • SHA1

      d08d9ed964bec7ce311ab9397b183ff92434b014

    • SHA256

      c0a8b772975259c3689d7fb83369fd211666217b7fb79192551851e8a6390b26

    • SHA512

      0956e365f70411a78b81b91f88ae4eec64b1704d05d1de4120edf97b79c4bc1206f93bb35eceffbaef5479cd491a818a896926cfb4f68897129f9c4accec92db

    • SSDEEP

      49152:4vKWgICXIs3zby2amZ+Vc/9HKGuMLDgtwe5EnvNtorahDx6+ZT41g85eOU8BPRV3:4Cz1RaUBKxtpivLf5Z41CqRVMU/

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks