General

  • Target

    2beffec571dce2052e563a0651424ac2a4be219dc068a283e5904a4ce767cdc0

  • Size

    2.0MB

  • Sample

    241105-q6dkksvlcp

  • MD5

    dd5d490f1451d01bfc3ab1f2dec6e62f

  • SHA1

    76b00533da1537cbea76d48a8d94ed0515d5a11d

  • SHA256

    2beffec571dce2052e563a0651424ac2a4be219dc068a283e5904a4ce767cdc0

  • SHA512

    053dba255ef0802130241416e85fe07ab4445739d5e75a7f65fc6e3d94c6b8881c7fb2b5560cfa35504540d9e75c65a221291ca5efe9ebf48e40580ce95c8d7d

  • SSDEEP

    49152:ekymnAy7Jj4UF+EotRaIKt/4QNL7/1jLmdPhox4vd:eUAYjpATtR0/NLbWPWx2

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      2beffec571dce2052e563a0651424ac2a4be219dc068a283e5904a4ce767cdc0

    • Size

      2.0MB

    • MD5

      dd5d490f1451d01bfc3ab1f2dec6e62f

    • SHA1

      76b00533da1537cbea76d48a8d94ed0515d5a11d

    • SHA256

      2beffec571dce2052e563a0651424ac2a4be219dc068a283e5904a4ce767cdc0

    • SHA512

      053dba255ef0802130241416e85fe07ab4445739d5e75a7f65fc6e3d94c6b8881c7fb2b5560cfa35504540d9e75c65a221291ca5efe9ebf48e40580ce95c8d7d

    • SSDEEP

      49152:ekymnAy7Jj4UF+EotRaIKt/4QNL7/1jLmdPhox4vd:eUAYjpATtR0/NLbWPWx2

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks