General

  • Target

    fe7c9c900df7c51f53243053dcf41ee781d284206742952aea704735d8d4a198.exe

  • Size

    420KB

  • Sample

    241211-eez4qavqbv

  • MD5

    26ceb3d9dcc1821192b39eea6832d51d

  • SHA1

    d22dae62f3d122acaec58a03550d5d99a9b7cfb4

  • SHA256

    fe7c9c900df7c51f53243053dcf41ee781d284206742952aea704735d8d4a198

  • SHA512

    2dd773c7afa7cb46c1f94d195e9b542a5e8ec150b608d8dcde0aa60f7aff15ea0fced33fe647519cca91ada905dce14576a8b2b84bc0c9ecfc6f362a3cdccda8

  • SSDEEP

    12288:+kmdgMiHbQuCIu+Sp+tXcyZpCxFzR7DB5:zmAHq+Sp+RbpCrF7V

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://92.255.57.89

Attributes
  • url_path

    /45c616e921a794b8.php

Targets

    • Target

      fe7c9c900df7c51f53243053dcf41ee781d284206742952aea704735d8d4a198.exe

    • Size

      420KB

    • MD5

      26ceb3d9dcc1821192b39eea6832d51d

    • SHA1

      d22dae62f3d122acaec58a03550d5d99a9b7cfb4

    • SHA256

      fe7c9c900df7c51f53243053dcf41ee781d284206742952aea704735d8d4a198

    • SHA512

      2dd773c7afa7cb46c1f94d195e9b542a5e8ec150b608d8dcde0aa60f7aff15ea0fced33fe647519cca91ada905dce14576a8b2b84bc0c9ecfc6f362a3cdccda8

    • SSDEEP

      12288:+kmdgMiHbQuCIu+Sp+tXcyZpCxFzR7DB5:zmAHq+Sp+RbpCrF7V

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks