General

  • Target

    75e9d83e734f70de74b22032c01c7adee9bc2b0244ab7506bc59c5adc27d81a6.exe

  • Size

    1.8MB

  • Sample

    241004-b19cqsxdrr

  • MD5

    622f9f481586d5dca1356051e20c13fa

  • SHA1

    4e56e103cdb596ddad6076de8132d9839abd0b3d

  • SHA256

    75e9d83e734f70de74b22032c01c7adee9bc2b0244ab7506bc59c5adc27d81a6

  • SHA512

    52b3dbee0cba1207b3698ebfb01c454f246b455f6f05d376dae0d987005f378d65ecc5e7ce744ec8810c27123ec107a064acfabce5dea01e723b2f4053cb7c03

  • SSDEEP

    24576:TTXLRC8M7zGSJ4quoGdAgo1nwoHkMmbey+qwrfy3CPP2VudSDrdqbp9PdA6+ttne:/FCU84quoYhumDzwXnWZya6GtnZajb

Malware Config

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Targets

    • Target

      75e9d83e734f70de74b22032c01c7adee9bc2b0244ab7506bc59c5adc27d81a6.exe

    • Size

      1.8MB

    • MD5

      622f9f481586d5dca1356051e20c13fa

    • SHA1

      4e56e103cdb596ddad6076de8132d9839abd0b3d

    • SHA256

      75e9d83e734f70de74b22032c01c7adee9bc2b0244ab7506bc59c5adc27d81a6

    • SHA512

      52b3dbee0cba1207b3698ebfb01c454f246b455f6f05d376dae0d987005f378d65ecc5e7ce744ec8810c27123ec107a064acfabce5dea01e723b2f4053cb7c03

    • SSDEEP

      24576:TTXLRC8M7zGSJ4quoGdAgo1nwoHkMmbey+qwrfy3CPP2VudSDrdqbp9PdA6+ttne:/FCU84quoYhumDzwXnWZya6GtnZajb

    • Stealc

      Stealc is an infostealer written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks