General

  • Target

    5f79d691648d659f056472f3b5089bc12cff477bba43bd553dd321da16c11541.exe

  • Size

    1.8MB

  • Sample

    241005-brtkxsxcrm

  • MD5

    fe7f6458c12d8a2ca2465060f3b82058

  • SHA1

    57fa2123987f57837cbc0468b75175936b57beec

  • SHA256

    5f79d691648d659f056472f3b5089bc12cff477bba43bd553dd321da16c11541

  • SHA512

    05e33d45a952a57fc62928752e69d591063d2b6a6c3faf0a79306ec92d8286168ecdc28fc7dd0878cc0dec61eb171a489feb9807e7afdc228c3e28ef824b340f

  • SSDEEP

    49152:5UXbLtDlmsRoG2xK0bLvMm565XlrHBxE84aDz:5UPtBJRoG2fHMm2lrHPHFf

Malware Config

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Targets

    • Target

      5f79d691648d659f056472f3b5089bc12cff477bba43bd553dd321da16c11541.exe

    • Size

      1.8MB

    • MD5

      fe7f6458c12d8a2ca2465060f3b82058

    • SHA1

      57fa2123987f57837cbc0468b75175936b57beec

    • SHA256

      5f79d691648d659f056472f3b5089bc12cff477bba43bd553dd321da16c11541

    • SHA512

      05e33d45a952a57fc62928752e69d591063d2b6a6c3faf0a79306ec92d8286168ecdc28fc7dd0878cc0dec61eb171a489feb9807e7afdc228c3e28ef824b340f

    • SSDEEP

      49152:5UXbLtDlmsRoG2xK0bLvMm565XlrHBxE84aDz:5UPtBJRoG2fHMm2lrHPHFf

    • Stealc

      Stealc is an infostealer written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks