General

  • Target

    7182c9ebd0b63ecca32ddca0918125ba97ba67cc393297a269d1a4be87dabf9b.exe

  • Size

    1.8MB

  • Sample

    240928-bvz7wazcrk

  • MD5

    8e9e399810d55581ea8a384018d4a7f1

  • SHA1

    d5b617fa2991a0d26ab245e0fe0bccb90fd8fe2e

  • SHA256

    7182c9ebd0b63ecca32ddca0918125ba97ba67cc393297a269d1a4be87dabf9b

  • SHA512

    cea3d0e8cc0bbc5939c7f95b344d0477f573069a4e0987d624dd7fa124a897145cf76ab6b5eea042f0e5e84c0fd9de9b802f3599a79a45dd2ddf402a537c8d65

  • SSDEEP

    49152:2LG9AfmXzxYny4i2IH7wxOjDnNNZO5ZOs2WkZ4V:2LG9imi7ivbxjqtom

Malware Config

Extracted

Family

stealc

Botnet

save

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Targets

    • Target

      7182c9ebd0b63ecca32ddca0918125ba97ba67cc393297a269d1a4be87dabf9b.exe

    • Size

      1.8MB

    • MD5

      8e9e399810d55581ea8a384018d4a7f1

    • SHA1

      d5b617fa2991a0d26ab245e0fe0bccb90fd8fe2e

    • SHA256

      7182c9ebd0b63ecca32ddca0918125ba97ba67cc393297a269d1a4be87dabf9b

    • SHA512

      cea3d0e8cc0bbc5939c7f95b344d0477f573069a4e0987d624dd7fa124a897145cf76ab6b5eea042f0e5e84c0fd9de9b802f3599a79a45dd2ddf402a537c8d65

    • SSDEEP

      49152:2LG9AfmXzxYny4i2IH7wxOjDnNNZO5ZOs2WkZ4V:2LG9imi7ivbxjqtom

    • Stealc

      Stealc is an infostealer written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks