General

  • Target

    file.exe

  • Size

    2.0MB

  • Sample

    241103-284qbszlgm

  • MD5

    87a1e964eb044d44777fd0b24186d5aa

  • SHA1

    84a457d7bd7d35286074ae804ef42cc7a423d8c5

  • SHA256

    698aa036276b25c445e979476ba32336494e94424d7e7eae4a17efa9227c75ae

  • SHA512

    b3923c777d1ee725cc7f4257a2042d96d69041bdcb30a92f8f5db6eba9b4cdc71fd84e4fe056deb77358a1cdb484f57440f4b23cd0e3526da6674dd2f70574d8

  • SSDEEP

    49152:5npm4GunGfKbi2uMPJ//6fsq4nT4OthhOUW0PXWsv5P81:5nxGU1PpSfsq4nD/OQXWsC

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      file.exe

    • Size

      2.0MB

    • MD5

      87a1e964eb044d44777fd0b24186d5aa

    • SHA1

      84a457d7bd7d35286074ae804ef42cc7a423d8c5

    • SHA256

      698aa036276b25c445e979476ba32336494e94424d7e7eae4a17efa9227c75ae

    • SHA512

      b3923c777d1ee725cc7f4257a2042d96d69041bdcb30a92f8f5db6eba9b4cdc71fd84e4fe056deb77358a1cdb484f57440f4b23cd0e3526da6674dd2f70574d8

    • SSDEEP

      49152:5npm4GunGfKbi2uMPJ//6fsq4nT4OthhOUW0PXWsv5P81:5nxGU1PpSfsq4nD/OQXWsC

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks