General

  • Target

    c17ed24e02488677c15a7f9af66a0aba.bin

  • Size

    2.0MB

  • Sample

    241108-b22paasdpn

  • MD5

    4ba07a79fa83af14c1186920b5977074

  • SHA1

    1565efc3ac4090b9e3c78a3b58c6cf0aad1be5b7

  • SHA256

    2c960792085f3acc9c0f040e7c5adea2c6e904f4f1b554f6537d3fc8890913f5

  • SHA512

    8b65d33e3c9e705b4aef4785743133b013f16e1d0018ecef3a035ba390637ff16bedca76dac35e6c3d97703a8483eecb440efc67e862f863aa18349de615df88

  • SSDEEP

    49152:q3bfhAQshLeitLscOMiW07DgSTMFNn+eVjkwIl9QX04Wp4:q3bfCQkptLtfd07DGBn6wm2kY

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      61503aab6e8bb537631115556cf898894274211cae16c143081c2912532a018e.exe

    • Size

      2.0MB

    • MD5

      c17ed24e02488677c15a7f9af66a0aba

    • SHA1

      222cf4373cb4d9f05dccd3e2745a4b19cb4dd29f

    • SHA256

      61503aab6e8bb537631115556cf898894274211cae16c143081c2912532a018e

    • SHA512

      031737664e0233b9e3f96bb19263d6b02de181255c9ab78fc7d8bdebd7733e5e67652715222fdfcb6d1303648bdd01a8b5da6f21adf6ad85fafccdf16b7fb451

    • SSDEEP

      49152:l+UT9u2iXY1pBSxJs/OjJcUgzQZobZo1W:l+sZiXYZSPy19o1W

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks