Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
stealc.exe
-
Size
240KB
-
Sample
250124-hs7x9swkhx
-
MD5
6246067a1c9a7c1359ad63476ce0dcbe
-
SHA1
508023b2dc96336d0f74a645817da52866b6a20f
-
SHA256
e4fc16fb36a5cd9e8d7dfe42482e111c7ce91467f6ac100a0e76740b491df2d4
-
SHA512
229d591b47377656f90ba0832d62726cf126dd6ff4526b9a31ce20df8d29fa16e3161f747ed2e11014bab628b8c8d63ba11b563fc22021ce76a32642461d59fe
-
SSDEEP
3072:svmpNku2qhJlUNvh7oKaCVExHC/MYkklgztNR6DpWmUBd2r2O/6RRCHeP3KqX+n:W0kulZE7oO5kk+nYNWmeor9SzCot+
Behavioral task
behavioral1
Sample
stealc.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
stealc.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
http://64.95.13.166
-
url_path
/4c0eeee3a4b86b26.php
Targets
-
-
Target
stealc.exe
-
Size
240KB
-
MD5
6246067a1c9a7c1359ad63476ce0dcbe
-
SHA1
508023b2dc96336d0f74a645817da52866b6a20f
-
SHA256
e4fc16fb36a5cd9e8d7dfe42482e111c7ce91467f6ac100a0e76740b491df2d4
-
SHA512
229d591b47377656f90ba0832d62726cf126dd6ff4526b9a31ce20df8d29fa16e3161f747ed2e11014bab628b8c8d63ba11b563fc22021ce76a32642461d59fe
-
SSDEEP
3072:svmpNku2qhJlUNvh7oKaCVExHC/MYkklgztNR6DpWmUBd2r2O/6RRCHeP3KqX+n:W0kulZE7oO5kk+nYNWmeor9SzCot+
Score8/10-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4