General

  • Target

    0bbec756d66bba49a77f73a90a6360e930305982462c1ecf6120bfd47d0d14ff_Sigmanly

  • Size

    6.2MB

  • Sample

    241221-n1nr9aypfx

  • MD5

    0ffda94b68c7028111e5981ae87cbff4

  • SHA1

    716337b963c32cbd9839e460f0ff22357a2fe22c

  • SHA256

    0bbec756d66bba49a77f73a90a6360e930305982462c1ecf6120bfd47d0d14ff

  • SHA512

    b87fd54fb251d7d7e294fabb5ed12228665b2005674ea8dc06d46ae99eba50dc6c9c4df9379e1a83b4d65ac68e2bf91bf25bd76edf6b914b991b95d5810be2d9

  • SSDEEP

    98304:59df0IDlQ+i1VS7wbMTwavsJB1NfYfztrrBsZtRsD16HVMlJN86G0:t0ai1wUI9c1+BmZ3s5KA8K

Malware Config

Extracted

Family

stealc

Botnet

LogsDiller

C2

http://185.219.81.132

Attributes
  • url_path

    /1089481c07d09d21.php

Targets

    • Target

      0bbec756d66bba49a77f73a90a6360e930305982462c1ecf6120bfd47d0d14ff_Sigmanly

    • Size

      6.2MB

    • MD5

      0ffda94b68c7028111e5981ae87cbff4

    • SHA1

      716337b963c32cbd9839e460f0ff22357a2fe22c

    • SHA256

      0bbec756d66bba49a77f73a90a6360e930305982462c1ecf6120bfd47d0d14ff

    • SHA512

      b87fd54fb251d7d7e294fabb5ed12228665b2005674ea8dc06d46ae99eba50dc6c9c4df9379e1a83b4d65ac68e2bf91bf25bd76edf6b914b991b95d5810be2d9

    • SSDEEP

      98304:59df0IDlQ+i1VS7wbMTwavsJB1NfYfztrrBsZtRsD16HVMlJN86G0:t0ai1wUI9c1+BmZ3s5KA8K

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks