General

  • Target

    file.exe

  • Size

    2.0MB

  • Sample

    241105-2rm19a1cpr

  • MD5

    31003ac3d614ff3f8d87241fec9de18f

  • SHA1

    6a652b0393714009f7e9e5bf9ed2283dd20d8725

  • SHA256

    e3c2712e512393b442cda0b532d2f25c7bac0de7d5d8ba8d83ce545c827bebaf

  • SHA512

    8435592a34231bd2858e07076555f146c23391858723407e3086fff5ecc240cb1d40c1860745cd7d0f4cb9f161a5a2a277ef179cb484e87b6ebaf6bccf1615d4

  • SSDEEP

    49152:VEyMSvC3DcDQsiQad6isYw9dR+kVELZyR:J6TKQJdLihELZy

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      file.exe

    • Size

      2.0MB

    • MD5

      31003ac3d614ff3f8d87241fec9de18f

    • SHA1

      6a652b0393714009f7e9e5bf9ed2283dd20d8725

    • SHA256

      e3c2712e512393b442cda0b532d2f25c7bac0de7d5d8ba8d83ce545c827bebaf

    • SHA512

      8435592a34231bd2858e07076555f146c23391858723407e3086fff5ecc240cb1d40c1860745cd7d0f4cb9f161a5a2a277ef179cb484e87b6ebaf6bccf1615d4

    • SSDEEP

      49152:VEyMSvC3DcDQsiQad6isYw9dR+kVELZyR:J6TKQJdLihELZy

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks