General

  • Target

    file.exe

  • Size

    1.8MB

  • Sample

    241004-ymc4psshrk

  • MD5

    15b4fb45c8fad830f567f44c46ae69d1

  • SHA1

    a0f1d7f38ab55649870d9f428453f09455d05341

  • SHA256

    67149331320cd98dc62e08a55fb8033261d9c6cc76a51744db45fa7247104f44

  • SHA512

    9f5563685ee0eb9626c6fd8737836e85da2ba32ed1d416facc021d03e992cf3fdd7aba0fc6ee3df694d97ce5637d113c700ea27c6149f8e7c0653ba64f7fd32b

  • SSDEEP

    49152:qHQc15nUK2Jw6VpxvWrZ2KGDwfr4PQwV:qHQc15+wIerYIDw

Malware Config

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Targets

    • Target

      file.exe

    • Size

      1.8MB

    • MD5

      15b4fb45c8fad830f567f44c46ae69d1

    • SHA1

      a0f1d7f38ab55649870d9f428453f09455d05341

    • SHA256

      67149331320cd98dc62e08a55fb8033261d9c6cc76a51744db45fa7247104f44

    • SHA512

      9f5563685ee0eb9626c6fd8737836e85da2ba32ed1d416facc021d03e992cf3fdd7aba0fc6ee3df694d97ce5637d113c700ea27c6149f8e7c0653ba64f7fd32b

    • SSDEEP

      49152:qHQc15nUK2Jw6VpxvWrZ2KGDwfr4PQwV:qHQc15+wIerYIDw

    • Stealc

      Stealc is an infostealer written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks