General

  • Target

    f817ca9481d1a85feeb75b673eea7a88dd67f3f60fd9b64cf5259fab5bb75848.exe

  • Size

    2.0MB

  • Sample

    241105-e7zzesvhlr

  • MD5

    0a6bff9f711868a9d329f64b16ef0ca7

  • SHA1

    e825b1e8e95b2efecbf1421cd6092358efd694a8

  • SHA256

    f817ca9481d1a85feeb75b673eea7a88dd67f3f60fd9b64cf5259fab5bb75848

  • SHA512

    44fc354bba52c731fd6bf1aabd8e5657ec765029752c8ca5d246ddd3166020a97a54ef0fd7be9d98ef9b66fd8ba5301e76bf15014f7889f1c70c3d69f5defe5d

  • SSDEEP

    49152:XdHane4WjDuQl1HgS9HJUdNZ9EuUFqfRult:9aUT5XUB9PUFq

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      f817ca9481d1a85feeb75b673eea7a88dd67f3f60fd9b64cf5259fab5bb75848.exe

    • Size

      2.0MB

    • MD5

      0a6bff9f711868a9d329f64b16ef0ca7

    • SHA1

      e825b1e8e95b2efecbf1421cd6092358efd694a8

    • SHA256

      f817ca9481d1a85feeb75b673eea7a88dd67f3f60fd9b64cf5259fab5bb75848

    • SHA512

      44fc354bba52c731fd6bf1aabd8e5657ec765029752c8ca5d246ddd3166020a97a54ef0fd7be9d98ef9b66fd8ba5301e76bf15014f7889f1c70c3d69f5defe5d

    • SSDEEP

      49152:XdHane4WjDuQl1HgS9HJUdNZ9EuUFqfRult:9aUT5XUB9PUFq

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks