General

  • Target

    Document.lnk.download.lnk

  • Size

    2KB

  • Sample

    241212-m8h2astqdr

  • MD5

    d4f518a06f228fb45e26355095985eee

  • SHA1

    1fcdd6f0a1e7513c607bbbe40ce50567225e81e8

  • SHA256

    d9e9cf4e194792c8a81fa855733259a633e830d7753839c0b1be1314e3d478f3

  • SHA512

    0e4d4d728b29463efe163a1654a8f67c6fe363505d3d41ddd7c2bb2210f36e5eb2bfb3017394a14407c69e0f04fc8913650d56ae4b460f60a366379f6d2596d9

Malware Config

Extracted

Family

metastealer

C2

kiyaqoimsiieeyqa.xyz

ssqsmisuowqcwsqo.xyz

ykqmwgsuummieaug.xyz

ewukeskgqswqesiw.xyz

cscqcsgewmwwaaui.xyz

cyoksykiamiscyia.xyz

okgomokemoucqeso.xyz

ikwacuakiqeimwua.xyz

aawcsqqaywckiwmi.xyz

aiqasksgmyeqocei.xyz

qgumcuisgaeyuqqe.xyz

eiesoycamyqqgcea.xyz

ywceswakicsqomqw.xyz

auaieuewouawygku.xyz

cmiascusccywowcs.xyz

uiqkkomkaceqacec.xyz

quqeciymqmkqccqw.xyz

ssqsauuuyyigouou.xyz

aogaakukuugqswcy.xyz

ucgwcwsuqsuwewgc.xyz

Attributes
  • dga_seed

    21845

  • domain_length

    16

  • num_dga_domains

    10000

  • port

    443

Targets

    • Target

      Document.lnk.download.lnk

    • Size

      2KB

    • MD5

      d4f518a06f228fb45e26355095985eee

    • SHA1

      1fcdd6f0a1e7513c607bbbe40ce50567225e81e8

    • SHA256

      d9e9cf4e194792c8a81fa855733259a633e830d7753839c0b1be1314e3d478f3

    • SHA512

      0e4d4d728b29463efe163a1654a8f67c6fe363505d3d41ddd7c2bb2210f36e5eb2bfb3017394a14407c69e0f04fc8913650d56ae4b460f60a366379f6d2596d9

    • Meta Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • MetaStealer payload

    • Metastealer family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks