General

  • Target

    Tbfadf.exe

  • Size

    1.2MB

  • Sample

    250419-3a37ksyrx2

  • MD5

    1271c7d71b5eccab5d0a3d03f54df27e

  • SHA1

    c82699c0a9e8532efd110aa962d256572e155cce

  • SHA256

    41eaf132932134436e24b49cf634f2633d8e4ee61ab686ae475a1ebaf41e47c0

  • SHA512

    0026fd56622088427256c9661dc9d45e0aecb5a5bf38ea96de6723335081c2c98151c00774b8330d1f63636e6f95b507d684dd835e59b36b749e2e09f7526b58

  • SSDEEP

    24576:wzf4VUpERKJfMHEAAQWTGtbRyW3odC/gAeg9e4IWaSP:JNrAGtbRAnr4IW/P

Malware Config

Extracted

Family

stealc

Botnet

miauwonderlandhelp

C2

miauwonderland.help

Attributes
  • url_path

    /95e2879446ffa8f1.php

rc4.plain

Targets

    • Target

      Tbfadf.exe

    • Size

      1.2MB

    • MD5

      1271c7d71b5eccab5d0a3d03f54df27e

    • SHA1

      c82699c0a9e8532efd110aa962d256572e155cce

    • SHA256

      41eaf132932134436e24b49cf634f2633d8e4ee61ab686ae475a1ebaf41e47c0

    • SHA512

      0026fd56622088427256c9661dc9d45e0aecb5a5bf38ea96de6723335081c2c98151c00774b8330d1f63636e6f95b507d684dd835e59b36b749e2e09f7526b58

    • SSDEEP

      24576:wzf4VUpERKJfMHEAAQWTGtbRyW3odC/gAeg9e4IWaSP:JNrAGtbRAnr4IW/P

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks