General
-
Target
f12ecb7e8dd8bfb2d68df43267aeba89.exe
-
Size
6.1MB
-
Sample
241218-ztvsrs1pay
-
MD5
f12ecb7e8dd8bfb2d68df43267aeba89
-
SHA1
f84adbecb1cc3db6be01ea506cb8e3e747d8356a
-
SHA256
d851fac530f4b5d3f7f215f4257a8fd0248039b7beb7246b06fb2f47e5297d17
-
SHA512
7b694e3c7a02883fbde8868552411cd37e0724f5b7b884f3d8ea3597d2e5beb0701a5cea337471742b926a1f18bf2c1351929a872b04d43d91b36d46f180710a
-
SSDEEP
98304:ew9zSgxHa3GEff6K/lYxaSXAMeUx3HuzxXnjWxx0GYHl9T+Fxc+aE484jZweXt2:5zSMHanf3/W1A/G3HYCXtA4x2EkK02
Static task
static1
Behavioral task
behavioral1
Sample
f12ecb7e8dd8bfb2d68df43267aeba89.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f12ecb7e8dd8bfb2d68df43267aeba89.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
LogsDiller
http://185.219.81.135
-
url_path
/c708352984fb7ac0.php
Targets
-
-
Target
f12ecb7e8dd8bfb2d68df43267aeba89.exe
-
Size
6.1MB
-
MD5
f12ecb7e8dd8bfb2d68df43267aeba89
-
SHA1
f84adbecb1cc3db6be01ea506cb8e3e747d8356a
-
SHA256
d851fac530f4b5d3f7f215f4257a8fd0248039b7beb7246b06fb2f47e5297d17
-
SHA512
7b694e3c7a02883fbde8868552411cd37e0724f5b7b884f3d8ea3597d2e5beb0701a5cea337471742b926a1f18bf2c1351929a872b04d43d91b36d46f180710a
-
SSDEEP
98304:ew9zSgxHa3GEff6K/lYxaSXAMeUx3HuzxXnjWxx0GYHl9T+Fxc+aE484jZweXt2:5zSMHanf3/W1A/G3HYCXtA4x2EkK02
-
Stealc family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4