General

  • Target

    0c85cf88cc0a6c3d0e70c65cb21950483eecab46ac9f48a67c95c491c887c399.exe

  • Size

    2.8MB

  • Sample

    240921-bdsfpsxfjh

  • MD5

    7225b0b567b88ee71ae35bf42b2fee15

  • SHA1

    978b9da0ca23b70a3832a6df1742348449030aba

  • SHA256

    0c85cf88cc0a6c3d0e70c65cb21950483eecab46ac9f48a67c95c491c887c399

  • SHA512

    f3304616313bec850cff1bc6f7c5e54df488f912aff9ff0fcd6c0cf0a5e9a2c8cdb45aa7030f2c6ecdc5883c00457fe13cdfec334d75af54e063034d241ba66b

  • SSDEEP

    49152:8BFIGzl11KmxmcZMqg9JpjRTmd/v9yKBESoE0V4A:wIGR11KmxmcZVgrpgd/v9HESWV4A

Malware Config

Extracted

Family

stealc

Botnet

rave

C2

http://185.215.113.103

Attributes
  • url_path

    /e2b1563c6670f193.php

Targets

    • Target

      0c85cf88cc0a6c3d0e70c65cb21950483eecab46ac9f48a67c95c491c887c399.exe

    • Size

      2.8MB

    • MD5

      7225b0b567b88ee71ae35bf42b2fee15

    • SHA1

      978b9da0ca23b70a3832a6df1742348449030aba

    • SHA256

      0c85cf88cc0a6c3d0e70c65cb21950483eecab46ac9f48a67c95c491c887c399

    • SHA512

      f3304616313bec850cff1bc6f7c5e54df488f912aff9ff0fcd6c0cf0a5e9a2c8cdb45aa7030f2c6ecdc5883c00457fe13cdfec334d75af54e063034d241ba66b

    • SSDEEP

      49152:8BFIGzl11KmxmcZMqg9JpjRTmd/v9yKBESoE0V4A:wIGR11KmxmcZVgrpgd/v9HESWV4A

    • Stealc

      Stealc is an infostealer written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks