General

  • Target

    85424194e3012b5970ef13dda8861ae7.bin

  • Size

    1.7MB

  • Sample

    241027-btjhqs1grg

  • MD5

    435d817c386f267f8f7eef6c962f8c6e

  • SHA1

    72d10b1bde1218bb2606a240b528f630ae609d07

  • SHA256

    9ad8ef7e2d4352996793f937032dbfc063e31477093e3f6689b46bd1b5b7fd81

  • SHA512

    d8b4db02ec427aa8ebb76765151522fcfdb2d7dc968a4bbd13b4093497f4b0f3c4df946e415503b4187d71fc9d88250c22709121747c227ca31816215c7e36e4

  • SSDEEP

    49152:mnKD/2vF/fFrNhcls8XzC5EKzImTO+qT92+U4JK9Q:vD/29/Ws8zCCXHT92WK2

Malware Config

Extracted

Family

stealc

Botnet

doma

C2

http://185.215.113.37

Attributes
  • url_path

    /e2b1563c6670f193.php

Targets

    • Target

      52957d4501c8b066b7208e418ddb49848c116905b2a8c3d37366ed188fb99eda.exe

    • Size

      1.8MB

    • MD5

      85424194e3012b5970ef13dda8861ae7

    • SHA1

      d3464cf08ff3e16c81d08cefd1c6159c0a501a31

    • SHA256

      52957d4501c8b066b7208e418ddb49848c116905b2a8c3d37366ed188fb99eda

    • SHA512

      a24b6a7a8aaf431f584d38f3bee62c948ddaa488fc6d3c720ea39a1b1e47db1e4449211f36de14a50d66380b5bf2a722b125db6c23143b7de9a1e9941f6a396a

    • SSDEEP

      49152:8gaeIscyHv+wLZNB/vpjqB/s1qoI5mfIG+9xRe:8gVIZyFZLvMGEx5m1k3e

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks