General

  • Target

    2fde3af8c4c3f8d48b84383c63dab715.bin

  • Size

    2.0MB

  • Sample

    241108-bk68favjbn

  • MD5

    24b184e406ff9899a665f1157050ea9f

  • SHA1

    a99399e50342e7084b66145561bcdc8d537f4506

  • SHA256

    953197b134ab6b25a32e71bd0ed18ca5a4e51b2292ed784099d8c48c52f87186

  • SHA512

    f8bc3e40c16a40ab2741f1de575e46bbe5c6b8e2142c2840c067d80b31fa0cefe9154451f031756978746030e26e96341601dba76cb9ff42ed086ed196695803

  • SSDEEP

    49152:VugledhUp0PboUUg2iTa8RNVZD16507nizenjeTH4b/:Pea5UX2qNzD16502Fc7

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      0f080dc2456a574a26e769774b11917771e160adaf7c47e07c314e9fcd83cb5a.exe

    • Size

      2.0MB

    • MD5

      2fde3af8c4c3f8d48b84383c63dab715

    • SHA1

      f4463eb91c104176825e01a0f345e6ec732e8119

    • SHA256

      0f080dc2456a574a26e769774b11917771e160adaf7c47e07c314e9fcd83cb5a

    • SHA512

      6ab59be279b47f0c4a9496057b488bb2f85776f79d1e50925a75584adc37d75f6d359b487e0957049e6a5537c6873ec7feec43a828c31af67e56982239b87168

    • SSDEEP

      49152:ldIuId3HGYCCyyoe6HqAxaNAxpfMhysQ4u9V:/5Id2YQtqPNOpf74u

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks