General

  • Target

    4a1ecd263f814b6e853f0fb85f405a79.bin

  • Size

    2.0MB

  • Sample

    241108-bpqfgsvjgn

  • MD5

    15ea629782c4f950f1d5842ff653f513

  • SHA1

    d585c58a12406cc689aa755f16c082718d97828a

  • SHA256

    9ee987dec82661c24fefb273715d9c076f90e03500b540b0b21df5b432749036

  • SHA512

    18f3875dfbbc443bdf26a03cb0a3b3e033ab79e7b6f05fe43672f5f644efece868d9a08c2b0d132db21ab4bb64d7308886ab504fee87cdde914329347d78a19b

  • SSDEEP

    49152:2nmviE0BwJimnIS5IHH6DW8pe6YoFOLoA0pz7dVnqDx:cvHzmISWHaDLpe6YGnbHox

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      a14d98efb427a2f880155d0f0e6c5983ad1046283ccd2503d4e6689d7852b074.exe

    • Size

      2.1MB

    • MD5

      4a1ecd263f814b6e853f0fb85f405a79

    • SHA1

      a41ff8ee67a1965ab0f13e9a8a6432338ba806bc

    • SHA256

      a14d98efb427a2f880155d0f0e6c5983ad1046283ccd2503d4e6689d7852b074

    • SHA512

      ec0d2b0cc8cd1c9d9957a36e85c368eeaa5dd1b7bfea29048bc8bdcb3b04a4e2cee0848a3838638d4c4924948d4b490b310a5ae84a7680ba038a38b19d5ef819

    • SSDEEP

      49152:7AKMUq8dRQ5/PUyj5GLVNMP/G2FX34pw6YTQd:aWdRMPjQVNMP/GmYw6YTQd

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks