General

  • Target

    db8efd737c60da1233a238e9491161dda941173efafd68b6edf3d0ff1887b4df.exe

  • Size

    1.7MB

  • Sample

    240927-b9jhnsygqj

  • MD5

    98d7a0bcf93bbe56347ae7c5ed22e943

  • SHA1

    fb5bda9cbbf209da5514b9f733277759c06f3492

  • SHA256

    db8efd737c60da1233a238e9491161dda941173efafd68b6edf3d0ff1887b4df

  • SHA512

    29e4529c72c68918c11319638eb3ac67394fed3a46c07a26c17e29f83f23983d54b4e822b02d28f834695f95d7cd988bf43914f9eeb4ac64b4de5b2ccf1a6ac8

  • SSDEEP

    24576:se2s/oqG+Dp/ZbO+1KqWasjHwnTZ14NMl6d6rjVde1y66TvVy0pU61KXJGc8bVY4:bmqjDvO+1vWyMd6mqvJptMZGc8b

Malware Config

Extracted

Family

stealc

Botnet

save

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Targets

    • Target

      db8efd737c60da1233a238e9491161dda941173efafd68b6edf3d0ff1887b4df.exe

    • Size

      1.7MB

    • MD5

      98d7a0bcf93bbe56347ae7c5ed22e943

    • SHA1

      fb5bda9cbbf209da5514b9f733277759c06f3492

    • SHA256

      db8efd737c60da1233a238e9491161dda941173efafd68b6edf3d0ff1887b4df

    • SHA512

      29e4529c72c68918c11319638eb3ac67394fed3a46c07a26c17e29f83f23983d54b4e822b02d28f834695f95d7cd988bf43914f9eeb4ac64b4de5b2ccf1a6ac8

    • SSDEEP

      24576:se2s/oqG+Dp/ZbO+1KqWasjHwnTZ14NMl6d6rjVde1y66TvVy0pU61KXJGc8bVY4:bmqjDvO+1vWyMd6mqvJptMZGc8b

    • Stealc

      Stealc is an infostealer written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks