General

  • Target

    47bd0f65bdd541918d45ecddc51e18b3.bin

  • Size

    2.0MB

  • Sample

    241107-blsfns1lcw

  • MD5

    28577986f3315896b68761d4d0fdc1f7

  • SHA1

    91ef0283c2d1501e11bc3d1a59912211aa80f0bb

  • SHA256

    b94107930544723504995b7f06f7d3bc7c00a380d56e918b64507354c6e8138c

  • SHA512

    800a364a54eec3a96a8c0d109e3cd8010ec9c8dff642dd1c4bac34020f4330e7f94b387847c7649821d1b63550dd24af7584c850f314d0503080221ab947f42a

  • SSDEEP

    49152:ZgIyG6/Ep8LkxCK9mQExD/4/A/Mf4KUflXX+Lvt/E/:ZXyvMp1CK9mNVkf4tGW

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      7b01c8a4a7c7efa68631acb7979c62672b51cdd464ec181564db8578f0a26187.exe

    • Size

      2.1MB

    • MD5

      47bd0f65bdd541918d45ecddc51e18b3

    • SHA1

      1f3dd28e412bd2875f15d4c6df882feac5268b04

    • SHA256

      7b01c8a4a7c7efa68631acb7979c62672b51cdd464ec181564db8578f0a26187

    • SHA512

      e2853fe2bb2edcef933e57ccca76c234e8115c630598bdf6af0c6dea32c01d90d0ad83122b72b1daf620eef4bf946e0b0295536afae9c097a03828f3149f9808

    • SSDEEP

      49152:qMpNaNrfpTZ0chaE/+GSvNcIQ8EVcuFPb+9:h6NNTZ0LE/BS6ZV1jm

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks