General

  • Target

    e1eca91fddecc4eb0729d7a47e7950cd07bcfe3a195721c2ea132e79654a9fbf.exe

  • Size

    1.8MB

  • Sample

    241002-b3lz8a1clq

  • MD5

    7104794e5bc6d9668df3a837983e43df

  • SHA1

    6bbeef17a4443db7e332123055796aace85064d6

  • SHA256

    e1eca91fddecc4eb0729d7a47e7950cd07bcfe3a195721c2ea132e79654a9fbf

  • SHA512

    292b4a7b45ee0217ffd846739053ea5eb62646123e1e755fb13489333cdf5c3d307e7d6e6cee3a0f60cffb2266e8c8874185f82b4ca7acbe0da8b92d91a7d60d

  • SSDEEP

    24576:9H0JnrSqDsGenZ2+XIRQQD3USAlNoMuXOZ67J4viv7PZ7eaZHfoht7wkT4vYYx:GJrmNnE+XfpnH0ttTP5D/oht7jcQ

Malware Config

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Targets

    • Target

      e1eca91fddecc4eb0729d7a47e7950cd07bcfe3a195721c2ea132e79654a9fbf.exe

    • Size

      1.8MB

    • MD5

      7104794e5bc6d9668df3a837983e43df

    • SHA1

      6bbeef17a4443db7e332123055796aace85064d6

    • SHA256

      e1eca91fddecc4eb0729d7a47e7950cd07bcfe3a195721c2ea132e79654a9fbf

    • SHA512

      292b4a7b45ee0217ffd846739053ea5eb62646123e1e755fb13489333cdf5c3d307e7d6e6cee3a0f60cffb2266e8c8874185f82b4ca7acbe0da8b92d91a7d60d

    • SSDEEP

      24576:9H0JnrSqDsGenZ2+XIRQQD3USAlNoMuXOZ67J4viv7PZ7eaZHfoht7wkT4vYYx:GJrmNnE+XfpnH0ttTP5D/oht7jcQ

    • Stealc

      Stealc is an infostealer written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks