General

  • Target

    f5d2c95cee164bdb1ca2b8956d0d5e0ed25d2a7b7c234f5e774f81d541a5afdd.exe

  • Size

    1.7MB

  • Sample

    241002-b4zygavclh

  • MD5

    c4f8952c0f88d4e91f4070b4f72a9fe0

  • SHA1

    72b104000d52c68ae34248267715313059fd7bf0

  • SHA256

    f5d2c95cee164bdb1ca2b8956d0d5e0ed25d2a7b7c234f5e774f81d541a5afdd

  • SHA512

    ab9b9af5f7515749482958d409ddb56f61ae92f81e96e26479badcc2fd23189954649584e5aecb5a9f99c611eaec57af75f273c8bb1ce51ba101088ecb08fbe0

  • SSDEEP

    24576:UDeB0IBaM1VqQ9Dcg9FnLe7f7Hl+DkJvgkDxOjeiXGy/TTs3s6M8cxMrpdZRYRnN:UDeB9BRCmIb51CzGyfKM8cGNP

Malware Config

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Targets

    • Target

      f5d2c95cee164bdb1ca2b8956d0d5e0ed25d2a7b7c234f5e774f81d541a5afdd.exe

    • Size

      1.7MB

    • MD5

      c4f8952c0f88d4e91f4070b4f72a9fe0

    • SHA1

      72b104000d52c68ae34248267715313059fd7bf0

    • SHA256

      f5d2c95cee164bdb1ca2b8956d0d5e0ed25d2a7b7c234f5e774f81d541a5afdd

    • SHA512

      ab9b9af5f7515749482958d409ddb56f61ae92f81e96e26479badcc2fd23189954649584e5aecb5a9f99c611eaec57af75f273c8bb1ce51ba101088ecb08fbe0

    • SSDEEP

      24576:UDeB0IBaM1VqQ9Dcg9FnLe7f7Hl+DkJvgkDxOjeiXGy/TTs3s6M8cxMrpdZRYRnN:UDeB9BRCmIb51CzGyfKM8cGNP

    • Stealc

      Stealc is an infostealer written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks