General

  • Target

    86d56848a2231f9b3fb85a93318867ea31c0f1a58e6a8dd92115fa18b3deb663

  • Size

    2.0MB

  • Sample

    241106-q1hbkszpgt

  • MD5

    a48cf87c8f6511be994f5aa11385f188

  • SHA1

    d901949d4d93d392a8f09b9c2ea0763dd9c1b27d

  • SHA256

    86d56848a2231f9b3fb85a93318867ea31c0f1a58e6a8dd92115fa18b3deb663

  • SHA512

    2a33f72c575697a4e3c4cad6863e6eb1a12bb5f5c3802c2872d71c5c75cf39fa546d4665917f38de30dd25fb985fc92e492407435476c73349e0f379cb10317c

  • SSDEEP

    49152:oamwHAnAKgA+uOht7q6Eyx4TdDd0D0xzwxylMZXceIHUVeybql:oanxfnt7xid50uSLZMeIHUVeQq

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      86d56848a2231f9b3fb85a93318867ea31c0f1a58e6a8dd92115fa18b3deb663

    • Size

      2.0MB

    • MD5

      a48cf87c8f6511be994f5aa11385f188

    • SHA1

      d901949d4d93d392a8f09b9c2ea0763dd9c1b27d

    • SHA256

      86d56848a2231f9b3fb85a93318867ea31c0f1a58e6a8dd92115fa18b3deb663

    • SHA512

      2a33f72c575697a4e3c4cad6863e6eb1a12bb5f5c3802c2872d71c5c75cf39fa546d4665917f38de30dd25fb985fc92e492407435476c73349e0f379cb10317c

    • SSDEEP

      49152:oamwHAnAKgA+uOht7q6Eyx4TdDd0D0xzwxylMZXceIHUVeybql:oanxfnt7xid50uSLZMeIHUVeQq

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks