General

  • Target

    8027fb5b61305a3b8b76e8f4494d22112bba0b404cdf34e4d67f5522b2691fb2

  • Size

    2.0MB

  • Sample

    241105-lhsblsycqa

  • MD5

    74bb55a474b1c94e55193bbd6fd37364

  • SHA1

    101b1afbeca11fb3953fe22c4d0557ba93db7330

  • SHA256

    8027fb5b61305a3b8b76e8f4494d22112bba0b404cdf34e4d67f5522b2691fb2

  • SHA512

    5b52d323e8c561dd75e249a5265959bd46557ecf61691c4f516a2f541da693988c3b917fbcc8d58b605e4d7c7687aeea3c5510b9e0c5f4324944025532fa42a1

  • SSDEEP

    24576:gd8HBNAOGZa2fmZPYtCgfFM9Ca7eZ3XtGIWU0dqji/y0SRfa35FLdjnStCyu98kC:g/ZaXQlG7EHtMaOyTubdetCj95WLs

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      8027fb5b61305a3b8b76e8f4494d22112bba0b404cdf34e4d67f5522b2691fb2

    • Size

      2.0MB

    • MD5

      74bb55a474b1c94e55193bbd6fd37364

    • SHA1

      101b1afbeca11fb3953fe22c4d0557ba93db7330

    • SHA256

      8027fb5b61305a3b8b76e8f4494d22112bba0b404cdf34e4d67f5522b2691fb2

    • SHA512

      5b52d323e8c561dd75e249a5265959bd46557ecf61691c4f516a2f541da693988c3b917fbcc8d58b605e4d7c7687aeea3c5510b9e0c5f4324944025532fa42a1

    • SSDEEP

      24576:gd8HBNAOGZa2fmZPYtCgfFM9Ca7eZ3XtGIWU0dqji/y0SRfa35FLdjnStCyu98kC:g/ZaXQlG7EHtMaOyTubdetCj95WLs

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks