General

  • Target

    86547b0f3c6512363905143949a17741e7d57e1015c4e71953ca3785fcac5be1.exe

  • Size

    1.7MB

  • Sample

    241009-cc2hna1enr

  • MD5

    16f2b35b4a02ad30cbf86196d8415db1

  • SHA1

    a18e1c23e750d33d149e82117cf0aa6dccb2545e

  • SHA256

    86547b0f3c6512363905143949a17741e7d57e1015c4e71953ca3785fcac5be1

  • SHA512

    c9e6129cbdc1f96799a7b628b69291e8acf49780a2ecec77c25212af4fd7559b804294b7f9d966ea6c188de5cc125e0d3bdf9019a419e0fd126edf228a88dfc6

  • SSDEEP

    49152:VScskUnQSphFVsfByU+lxLReKQqQ96QOvXTCKBk:lVUDCmlx6fOP

Malware Config

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Targets

    • Target

      86547b0f3c6512363905143949a17741e7d57e1015c4e71953ca3785fcac5be1.exe

    • Size

      1.7MB

    • MD5

      16f2b35b4a02ad30cbf86196d8415db1

    • SHA1

      a18e1c23e750d33d149e82117cf0aa6dccb2545e

    • SHA256

      86547b0f3c6512363905143949a17741e7d57e1015c4e71953ca3785fcac5be1

    • SHA512

      c9e6129cbdc1f96799a7b628b69291e8acf49780a2ecec77c25212af4fd7559b804294b7f9d966ea6c188de5cc125e0d3bdf9019a419e0fd126edf228a88dfc6

    • SSDEEP

      49152:VScskUnQSphFVsfByU+lxLReKQqQ96QOvXTCKBk:lVUDCmlx6fOP

    • Stealc

      Stealc is an infostealer written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks