General

  • Target

    c57aa72ced3f3b2b7a9bb383ca178525.bin

  • Size

    2.0MB

  • Sample

    241106-b3h9bssfjf

  • MD5

    d7badfb8a856ebbe4225d3ef2b0605f1

  • SHA1

    464c01f999ab17ed904489b139d2866b842ab972

  • SHA256

    7ad1dc152cbcceb382ce7e4b739a794463a074e3fc4488897fb4e2449c7e90d1

  • SHA512

    26954c32159f944fe7122c0babe2ac4bf4016b14c247e27e753eda9f7b349e996fb0794e077a0f0bfa548e81c7723155b1357cee0d044986f417633c340246ab

  • SSDEEP

    24576:I8kHq9m1hlgxKhcAPz28gH6+jptyJo0+dSsvqrT4/OMYb982Q1+79gmrHUeNsWOM:I8kK6lgkvPwduoqrj9+1k95UeNyY+UN

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      6800cb56d8bcd50e6380d8c3e3acb932923c7b2db5046370b7564ef439502ea0.exe

    • Size

      2.0MB

    • MD5

      c57aa72ced3f3b2b7a9bb383ca178525

    • SHA1

      cc19ccb0c3f2b77e6185fb83e19779864d9f3754

    • SHA256

      6800cb56d8bcd50e6380d8c3e3acb932923c7b2db5046370b7564ef439502ea0

    • SHA512

      2d5f276291b8f041ecf654e494cef66a42146c8d5529fb9f58a10ff0669c0237c78afe8fa11bd4fb753505c8eb50721e3c0e84c61596ae5aaa2e2f77639b0b8a

    • SSDEEP

      49152:ihA6vmgWWF7k/hRJmjYxKpV1cyqOFzgL5LIsBVbM/8X:yAa97Jj8MGe+IsB+

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks