General

  • Target

    2f595e9186b87cd4870ea38f16393d8f.bin

  • Size

    1.7MB

  • Sample

    241120-bgqfhs1raj

  • MD5

    8eece5ed678c8d42c2338e90a0f36e34

  • SHA1

    98a1143e0abee802f4ce0d0a44fd2c6483abcf3f

  • SHA256

    795f625eac6b611110bf83f3e4ca40c0dac9105bd9a1726e9047a56f4c1d08e1

  • SHA512

    236c6207903cf47561d06ba2635a0a0a1cc709d14a0d680c1e190bd99e5eeb769254ef9e84cd846e9c840862a30f4514d2ddb04d6b35003a74a2c4b0b595d513

  • SSDEEP

    49152:UMMNhj60R9DpC/2kXxwFBSYsfGUrm/2xXr7:UMAh20dOiBK+uxXr7

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      f8b9bc1fd2af3813bfc5c6197a0d20448c21c86f703835782701092d10a1615a.exe

    • Size

      1.8MB

    • MD5

      2f595e9186b87cd4870ea38f16393d8f

    • SHA1

      4db3549b4dd7c93d8b795e8b194c8f3a105a2b6b

    • SHA256

      f8b9bc1fd2af3813bfc5c6197a0d20448c21c86f703835782701092d10a1615a

    • SHA512

      e1f8de211fb23c8e492dbf43301267f5712c886657c758b189594de80f9bf23f7428d235ad1672101989f544fa8d0185fd2cc70d78cf17a24649b6a59b5fdfc3

    • SSDEEP

      24576:nyrnZpBGO1cKZkRA+aaKDs1Cb10RxmasEdpxNG/7SZQL7Sd1mbjHqSUs5h2d7D2b:nyrnldZkR7ysG0XGEK/OMS6XK2yQJ

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks