Link: Oski Lab
Looking through the Crowdsourced IDS rules, we can see that it’s labeled as the StealC C2 malware, a known infostealer.
I found it interesting to note that while the malware was made in 2022, its first sighting was almost exactly a year later.
With C2, attackers may set up web servers to beacon and exfiltrate data from their victims.
According to HYAS’ StealC Report, the malware requests this SQL library to assist with credential exfiltration and database access.
any.run has a library of user reports regarding malware. I made a search using the hash, and clicked on the oldest entry to view the report.
I scrolled down a bit to view any relevant information, and I found some under Malware Configuration. There’s a convenient section labeled “Keys” that contained the RC4 key. Using this to decrypt the attacker’s code would be extremely useful for static code analysis.
Luckily, the full any.run report contains information regarding these tactics and techniques in a convenient ATT&CK matrix.
StealC steals credentials like passwords from their victims. This is labeled as “Credentials from Password Stores” under Credential Access, aka T1555.