2025-12-22 (MONDAY): STEALC FROM FILES IMPERSONATING CRACKED VERSIONS OF POPULAR SOFTWARE

ASSOCIATED FILES:

NOTES:

 

2025-12-22 (MONDAY): STEALC FROM FILES IMPERSONATING CRACKED VERSIONS OF POPULAR SOFTWARE

TRAFFIC LEADING TO THE INITIAL FILE DOWNLOAD:

- Page from site claiming to have cracked version of popular software
- hxxps[:]//gorcerie[.]com/the-impact-of-clear-excess-formats-on-business-performance-and-data-integrity/?[info removed]
- hxxps[:]//media.maxdatahost1[.]lat/share/download?AH2hSGmZbAUAWGgCAFVTFwASAAAAAADc/[name of software]&rar
- hxxps[:]//arch2.megafilehost8[.]mom/e/get/0dW2euBOrmIidUcl3Q7OBgzi/application.zip

EXAMPLE OF STEALC TRAFFIC AFTER RUNNING EXE EXTRACTED FROM THE DOWNLOADED FILE:

- hxxp[:]//37.221.66[.]166/4a815a53876a4172.php  <-- repeated HTTP POST requests

ASSOCIATED FILES

- SHA256 hash: fd885e2a9fa8b945850f42fe2a27fdd75b377c34b77b12af2366d38e90062af3
- File size: 15,228,803 bytes
- File name: application.7z
- File type: 7-zip archive data, version 0.4
- File description: Initial download, a password-protected 7-zip archive
- Password: 4650

- SHA256 hash: 8d46297b6191e44ff42975839bd767662622aed84e1d0025b05e171f55ff015e
- File size: 895,382,766 bytes
- File name: appFile.exe
- File type: PE32+ executable (GUI) x86-64, for MS Windows
- File description: Extracted from the 7-zip archive, an inflated 64-bit EXE padded with null bytes

- SHA256 hash: b2f7371fa7599c9e72d7e3f4129741b8d240a4b8b00e2e889835c57c66f21848
- File size: 30,796,046 bytes
- File type: PE32+ executable (GUI) x86-64, for MS Windows
- File description: The above 64-bit EXE with most of the null bytes removed

 

IMAGES


Shown above:  Example of page with URL to download the initial file.

 


Shown above:  Using the URL to download the initial file, a password-protected 7-zip archive.

 


Shown above:  Opening the password-protected 7-zip archive.

 


Shown above:  Characteristics of the inflated EXE within the 7-zip archive.

 


Shown above:  StealC traffic after running the inflated EXE.

 


Shown above:  TCP stream of the StealC traffic.

 

Click here to return to the main page.