General

  • Target

    4c632322bff9d2562ebf7783cc411db8.exe

  • Size

    419KB

  • Sample

    241210-rjdshaxmaw

  • MD5

    4c632322bff9d2562ebf7783cc411db8

  • SHA1

    f9a82d6aa7867b3e55907c8976ecdc564195ae8d

  • SHA256

    4adede428b6bdfba962baae89274a4697e33f70fa4ee9265f2d945e83e408265

  • SHA512

    f457d70ce849bd115c3e966f3460899cd84e8d062b0b68d33d47b536268972b977b155da017b8a3667d21cdc4eafeceb0ee1ba7693ebd18d66562883a36375d5

  • SSDEEP

    6144:tm2uj3DmwiSj+Q/g2ygrx2h0jyG0clDM6oMYYub9hjD68u3h:cFL/9x2heyGdl997ub3+8u3

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://92.255.57.89

Attributes
  • url_path

    /45c616e921a794b8.php

Targets

    • Target

      4c632322bff9d2562ebf7783cc411db8.exe

    • Size

      419KB

    • MD5

      4c632322bff9d2562ebf7783cc411db8

    • SHA1

      f9a82d6aa7867b3e55907c8976ecdc564195ae8d

    • SHA256

      4adede428b6bdfba962baae89274a4697e33f70fa4ee9265f2d945e83e408265

    • SHA512

      f457d70ce849bd115c3e966f3460899cd84e8d062b0b68d33d47b536268972b977b155da017b8a3667d21cdc4eafeceb0ee1ba7693ebd18d66562883a36375d5

    • SSDEEP

      6144:tm2uj3DmwiSj+Q/g2ygrx2h0jyG0clDM6oMYYub9hjD68u3h:cFL/9x2heyGdl997ub3+8u3

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks