General

  • Target

    00b64a8f000a39d92c926d80c605708ff54f16b0da9a0ba001515e7fc185fb4b

  • Size

    1.7MB

  • Sample

    240901-nc2n7sygqm

  • MD5

    9a60773af64dad81aae3d94abbe700ac

  • SHA1

    ba78ba964bcb7bc437e266288175c25d97d13fcd

  • SHA256

    00b64a8f000a39d92c926d80c605708ff54f16b0da9a0ba001515e7fc185fb4b

  • SHA512

    bf9547b9713c06906e726db9d86e80251bc3f34727d8c6a0dc26ec5d89c6afbf535a2841802fc81f8fa38cfc316b21b47b6daca3edfd4fe62e159521921de1f9

  • SSDEEP

    49152:YxN5RJiU1Z0EXRelOE0gU2ZXJl5HfNE/jN5DS:YxLbT1ZNXRelO6HJV6N5W

Malware Config

Extracted

Family

stealc

Botnet

leva

C2

http://185.215.113.100

Attributes
  • url_path

    /e2b1563c6670f193.php

Targets

    • Target

      29c0837a12402c5c105fb2f2d3e31010b244c6ec0c437b3b7a977709f981d481.exe

    • Size

      1.7MB

    • MD5

      32fab6249908f4132bd4112d5d07c8f7

    • SHA1

      6adafe56c06fde0cc3cb31ba02bb32f2a499fe83

    • SHA256

      29c0837a12402c5c105fb2f2d3e31010b244c6ec0c437b3b7a977709f981d481

    • SHA512

      f3e24f8d6c7dba0315a27de7503a0f269618caaceeaefbb3fbba742b8d36854386246de3aa024ee95a474db9d440a5cf77017b38d65b0977007c4c7740c15f33

    • SSDEEP

      24576:elFsHdob8laggbUwdIXDa2cDMfrgx+ZJSzRmNprmzsnZkTdwktav8ZztYyHszbQY:2Fxq7hwwa2Nf8x+KzRarmzLdrEvLQNK

    • Stealc

      Stealc is an infostealer written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks