General

  • Target

    50c5eb159c1df9e3627a2dc270297d65e759fba62e4c6081619365357f188aacN

  • Size

    2.1MB

  • Sample

    241105-sfsypatgmm

  • MD5

    943ef4ceee0552b2a23e7f50163c16a0

  • SHA1

    108869e2d6f5298b80ffcda8a708d63bff02fb4a

  • SHA256

    50c5eb159c1df9e3627a2dc270297d65e759fba62e4c6081619365357f188aac

  • SHA512

    0d4c2091ba41cf6aab0e376212694920b6b784f9835a2bfc0d8d0229c74d085615a83e772765ff2ec7f637264e61706d5d276feb4b4f40a8117e6c523203c9fc

  • SSDEEP

    49152:58VIWqAyU/KinXQJvMmWGupmgalt8DwsiXKml2mpj2a+w93:8IuB/KiXAvMmWdAlqEImbfj93

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      50c5eb159c1df9e3627a2dc270297d65e759fba62e4c6081619365357f188aacN

    • Size

      2.1MB

    • MD5

      943ef4ceee0552b2a23e7f50163c16a0

    • SHA1

      108869e2d6f5298b80ffcda8a708d63bff02fb4a

    • SHA256

      50c5eb159c1df9e3627a2dc270297d65e759fba62e4c6081619365357f188aac

    • SHA512

      0d4c2091ba41cf6aab0e376212694920b6b784f9835a2bfc0d8d0229c74d085615a83e772765ff2ec7f637264e61706d5d276feb4b4f40a8117e6c523203c9fc

    • SSDEEP

      49152:58VIWqAyU/KinXQJvMmWGupmgalt8DwsiXKml2mpj2a+w93:8IuB/KiXAvMmWdAlqEImbfj93

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks