General

  • Target

    7b4ab66f63fbcdef6a7be43b9a1f7f4ca6e8145a08562a71d631b891e5e651b3

  • Size

    2.1MB

  • Sample

    241117-r5vyxascke

  • MD5

    3c217d03436985a1b3e9c03f442f19f6

  • SHA1

    bcc1959d1d8c76c69a306cf4b319fdeb5e841856

  • SHA256

    7b4ab66f63fbcdef6a7be43b9a1f7f4ca6e8145a08562a71d631b891e5e651b3

  • SHA512

    c9ff189d08497428c4810c35d1ad6a2bd4d5dea2ede58af3756a7dc16f836d46357db85412115ba313c6b169afcca048024ff06f4fa6febe4286ed5eab76e56d

  • SSDEEP

    49152:18zw0z6ppEvDVBQ2aK9oAr1Do8/ncyh0UldDAA9rulXompIgGHiay/:1n0z67E7VO2W4o8PcGtDb9rQoXgla6

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      7b4ab66f63fbcdef6a7be43b9a1f7f4ca6e8145a08562a71d631b891e5e651b3

    • Size

      2.1MB

    • MD5

      3c217d03436985a1b3e9c03f442f19f6

    • SHA1

      bcc1959d1d8c76c69a306cf4b319fdeb5e841856

    • SHA256

      7b4ab66f63fbcdef6a7be43b9a1f7f4ca6e8145a08562a71d631b891e5e651b3

    • SHA512

      c9ff189d08497428c4810c35d1ad6a2bd4d5dea2ede58af3756a7dc16f836d46357db85412115ba313c6b169afcca048024ff06f4fa6febe4286ed5eab76e56d

    • SSDEEP

      49152:18zw0z6ppEvDVBQ2aK9oAr1Do8/ncyh0UldDAA9rulXompIgGHiay/:1n0z67E7VO2W4o8PcGtDb9rQoXgla6

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks