General

  • Target

    file.exe

  • Size

    2.0MB

  • Sample

    241102-1aqv5svrcw

  • MD5

    abe2d3c6c95bc4eb7fd24fd8095b4104

  • SHA1

    48c25f37cb652c70008b7fe0d041a212dace5398

  • SHA256

    2b96d5f873119e5a22e3c38f916c311ad7ed5b54bc4b0bbddcbaef3b008e5909

  • SHA512

    a4a746a0ab0c191eb70a9f93757cf85d93b94802da18d1c09767fa1f2eb5db0b9415425b79d4ef1a058ba4df7ba79d39432ccd0b227f529d3ef08c2934cd2f09

  • SSDEEP

    49152:KV45O6/ToN0RUydwwpnsDXzfPnQV5/HT/vjx9/4z:K6O4ToN0OYpezw5/T/v/4z

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      file.exe

    • Size

      2.0MB

    • MD5

      abe2d3c6c95bc4eb7fd24fd8095b4104

    • SHA1

      48c25f37cb652c70008b7fe0d041a212dace5398

    • SHA256

      2b96d5f873119e5a22e3c38f916c311ad7ed5b54bc4b0bbddcbaef3b008e5909

    • SHA512

      a4a746a0ab0c191eb70a9f93757cf85d93b94802da18d1c09767fa1f2eb5db0b9415425b79d4ef1a058ba4df7ba79d39432ccd0b227f529d3ef08c2934cd2f09

    • SSDEEP

      49152:KV45O6/ToN0RUydwwpnsDXzfPnQV5/HT/vjx9/4z:K6O4ToN0OYpezw5/T/v/4z

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks