General
-
Target
a524d1acb0692fc90e20548d4bea29b4996c4113420942e43addd8c5609e29a4.ps1
-
Size
2KB
-
Sample
250228-dyjqeazqw2
-
MD5
be8a297796619e2e1c2a81ccd6d28273
-
SHA1
db12d6bde2d2caf1ab10ed8096550fa320260496
-
SHA256
a524d1acb0692fc90e20548d4bea29b4996c4113420942e43addd8c5609e29a4
-
SHA512
53163cda3c0ef665b5fbf37c9e20f0e9cc2dbe952332dc98d990f62239894f8ed318fd1e36c93fcfe200d81e690593dea7e7f0eb89c78e2858b5101f1a2047f6
Static task
static1
Behavioral task
behavioral1
Sample
a524d1acb0692fc90e20548d4bea29b4996c4113420942e43addd8c5609e29a4.ps1
Resource
win7-20240903-en
Malware Config
Extracted
stealc
Clizma
http://104.245.240.18
-
url_path
/d7f85cd3e24a4757.php
Targets
-
-
Target
a524d1acb0692fc90e20548d4bea29b4996c4113420942e43addd8c5609e29a4.ps1
-
Size
2KB
-
MD5
be8a297796619e2e1c2a81ccd6d28273
-
SHA1
db12d6bde2d2caf1ab10ed8096550fa320260496
-
SHA256
a524d1acb0692fc90e20548d4bea29b4996c4113420942e43addd8c5609e29a4
-
SHA512
53163cda3c0ef665b5fbf37c9e20f0e9cc2dbe952332dc98d990f62239894f8ed318fd1e36c93fcfe200d81e690593dea7e7f0eb89c78e2858b5101f1a2047f6
-
Stealc family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4