General
-
Target
0ffda94b68c7028111e5981ae87cbff4.exe
-
Size
6.2MB
-
Sample
241220-t1cymszjfz
-
MD5
0ffda94b68c7028111e5981ae87cbff4
-
SHA1
716337b963c32cbd9839e460f0ff22357a2fe22c
-
SHA256
0bbec756d66bba49a77f73a90a6360e930305982462c1ecf6120bfd47d0d14ff
-
SHA512
b87fd54fb251d7d7e294fabb5ed12228665b2005674ea8dc06d46ae99eba50dc6c9c4df9379e1a83b4d65ac68e2bf91bf25bd76edf6b914b991b95d5810be2d9
-
SSDEEP
98304:59df0IDlQ+i1VS7wbMTwavsJB1NfYfztrrBsZtRsD16HVMlJN86G0:t0ai1wUI9c1+BmZ3s5KA8K
Static task
static1
Behavioral task
behavioral1
Sample
0ffda94b68c7028111e5981ae87cbff4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0ffda94b68c7028111e5981ae87cbff4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
LogsDiller
http://185.219.81.132
-
url_path
/1089481c07d09d21.php
Targets
-
-
Target
0ffda94b68c7028111e5981ae87cbff4.exe
-
Size
6.2MB
-
MD5
0ffda94b68c7028111e5981ae87cbff4
-
SHA1
716337b963c32cbd9839e460f0ff22357a2fe22c
-
SHA256
0bbec756d66bba49a77f73a90a6360e930305982462c1ecf6120bfd47d0d14ff
-
SHA512
b87fd54fb251d7d7e294fabb5ed12228665b2005674ea8dc06d46ae99eba50dc6c9c4df9379e1a83b4d65ac68e2bf91bf25bd76edf6b914b991b95d5810be2d9
-
SSDEEP
98304:59df0IDlQ+i1VS7wbMTwavsJB1NfYfztrrBsZtRsD16HVMlJN86G0:t0ai1wUI9c1+BmZ3s5KA8K
-
Stealc family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4