General

  • Target

    3c217d03436985a1b3e9c03f442f19f6.bin

  • Size

    2.0MB

  • Sample

    241110-bg95xsyper

  • MD5

    4e4a8cc1686c12cb71355ca258507e3a

  • SHA1

    a3eb7a2935911de3b1ef14c31303d1a595188056

  • SHA256

    ae4ee74aa47f6a41d2b8a7ccf6600cd873902e5e1b1013df01c9ec052c69d410

  • SHA512

    ce58c723df8bff5ca46594c0addacb2505e0a230e626611ba78b2b1a963387c355a36762d6d81b9e2487b7825199cb0473cb68ec09c6196490279273e2e37bed

  • SSDEEP

    49152:XXSx4234S/bD8gyadFix27Fyf06G7dGvBxWj+xH:XCx/345azy27a06G7deEj6

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      7b4ab66f63fbcdef6a7be43b9a1f7f4ca6e8145a08562a71d631b891e5e651b3.exe

    • Size

      2.1MB

    • MD5

      3c217d03436985a1b3e9c03f442f19f6

    • SHA1

      bcc1959d1d8c76c69a306cf4b319fdeb5e841856

    • SHA256

      7b4ab66f63fbcdef6a7be43b9a1f7f4ca6e8145a08562a71d631b891e5e651b3

    • SHA512

      c9ff189d08497428c4810c35d1ad6a2bd4d5dea2ede58af3756a7dc16f836d46357db85412115ba313c6b169afcca048024ff06f4fa6febe4286ed5eab76e56d

    • SSDEEP

      49152:18zw0z6ppEvDVBQ2aK9oAr1Do8/ncyh0UldDAA9rulXompIgGHiay/:1n0z67E7VO2W4o8PcGtDb9rQoXgla6

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks