General

  • Target

    24f92db69d14575388d39cfbb065ff06b14fedc28fc9e1fedad851672ac6111f.exe

  • Size

    1.7MB

  • Sample

    241120-cslr5sygpj

  • MD5

    38a9ecc0994ecbddb16d6fb2d4a3e911

  • SHA1

    d4bd9f9c0b4dc11f8c4a2f5209ad4795fa4056d5

  • SHA256

    24f92db69d14575388d39cfbb065ff06b14fedc28fc9e1fedad851672ac6111f

  • SHA512

    3f9f7459007bb5af43c2dc11cf2d2b055572bb0b5dcd34d345eebe490a5a574d3d6fd76e822f308c1d7fa0766d29b5daa44b8ff9f622812497b55ce5948fcf0c

  • SSDEEP

    49152:6Z+u0Io0uNP//L7OaTShOKZ4bYFYb4/r7:6wu0Iq17zJKZViC

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      24f92db69d14575388d39cfbb065ff06b14fedc28fc9e1fedad851672ac6111f.exe

    • Size

      1.7MB

    • MD5

      38a9ecc0994ecbddb16d6fb2d4a3e911

    • SHA1

      d4bd9f9c0b4dc11f8c4a2f5209ad4795fa4056d5

    • SHA256

      24f92db69d14575388d39cfbb065ff06b14fedc28fc9e1fedad851672ac6111f

    • SHA512

      3f9f7459007bb5af43c2dc11cf2d2b055572bb0b5dcd34d345eebe490a5a574d3d6fd76e822f308c1d7fa0766d29b5daa44b8ff9f622812497b55ce5948fcf0c

    • SSDEEP

      49152:6Z+u0Io0uNP//L7OaTShOKZ4bYFYb4/r7:6wu0Iq17zJKZViC

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks