General

  • Target

    4857eea4cdb38f5a705744faa7a99a13f69cec9f07e2fbdf1fbfc25c32c731a7

  • Size

    2.0MB

  • Sample

    241116-3haj8szper

  • MD5

    95f58f03abe966d7541f2b73f4e6ba6e

  • SHA1

    09ccd41084a1560f5dba038378e4b07f9ce62798

  • SHA256

    4857eea4cdb38f5a705744faa7a99a13f69cec9f07e2fbdf1fbfc25c32c731a7

  • SHA512

    c4914809c91e806262c1352516a76f1fab5dbfed1432f451d648cd9993f8922198af26a419b89fa2a928b0045b9ccb3f4c063508e0d0ecbc4758094a99b2aeb3

  • SSDEEP

    49152:JvX4dktpeMxOWbPC4A97cdP+fMXQaVYa:JvX4K80B7C/MXQ

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      4857eea4cdb38f5a705744faa7a99a13f69cec9f07e2fbdf1fbfc25c32c731a7

    • Size

      2.0MB

    • MD5

      95f58f03abe966d7541f2b73f4e6ba6e

    • SHA1

      09ccd41084a1560f5dba038378e4b07f9ce62798

    • SHA256

      4857eea4cdb38f5a705744faa7a99a13f69cec9f07e2fbdf1fbfc25c32c731a7

    • SHA512

      c4914809c91e806262c1352516a76f1fab5dbfed1432f451d648cd9993f8922198af26a419b89fa2a928b0045b9ccb3f4c063508e0d0ecbc4758094a99b2aeb3

    • SSDEEP

      49152:JvX4dktpeMxOWbPC4A97cdP+fMXQaVYa:JvX4K80B7C/MXQ

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks