General

  • Target

    1fdb79f6854abd31f84d63942a7df92a.bin

  • Size

    2.0MB

  • Sample

    241105-bghexa1eja

  • MD5

    f8a84776e7f847ee221793b1eeb99e60

  • SHA1

    9d11e4d53c73d502eb0bea4964419b1178a7b3f4

  • SHA256

    f1c43165e40e9dcd5ff0830c0f7c4b29fdfcf4653a261a4e99e1c8029ef13101

  • SHA512

    a62904173015fe06b2b0593f1014ebd7550127571a36a23daec8dabddb02f9eeee8a616957ea1aff0c72324bb9f2dacc4b7c613340c07e68835778f07e080b7e

  • SSDEEP

    49152:vJQadeXVgE+F/CLvCsMBZlq47pcML6umkowHcvvJG4UCx4yd:am8B+1sqlqW+C6BOHqGAx/d

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      1708d8fa5bfe7e674be8a001ae811730edb7af49fde4e2bf131ae51ac5a19620.exe

    • Size

      2.0MB

    • MD5

      1fdb79f6854abd31f84d63942a7df92a

    • SHA1

      69545d24afcd930549a8a86b72ade7e29ccdf5ca

    • SHA256

      1708d8fa5bfe7e674be8a001ae811730edb7af49fde4e2bf131ae51ac5a19620

    • SHA512

      95d7c4d143ab3bb6f2e68252f23eeedadfb3a7348f96f21d81e3993b90bd07573d40ac9157b0bac85d9ffb93e509ac07f82b1813e8076998dbb26e16be20aa53

    • SSDEEP

      49152:qFZNYZAyuGFMFRlLTGfIUerX9PrG48bvTnBj9YHr4TYVY:qFsxFQRlTseb9jG4+LRirW

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks