General

  • Target

    431c2c4b3f9bbefd63dbf6db93d42bde3d674c13aaf86409622b7dc372c37868.exe

  • Size

    1.7MB

  • Sample

    241120-hrr6essgre

  • MD5

    f6e380fc4237efa20d388d1e1cdbeea6

  • SHA1

    eae29f3c97c9276b089dc7d186ab5fae60532f95

  • SHA256

    431c2c4b3f9bbefd63dbf6db93d42bde3d674c13aaf86409622b7dc372c37868

  • SHA512

    4edb91237f0f2645170c4678818b87c84ce80bd63643e3942a716c273e80da1e664c3054e81ccb33129585bc1376480af366b45cd1c148be2a040af70f885581

  • SSDEEP

    49152:cpFAWg/4zXBC3cKxItsXGiTM1FXpgIHjLDDG:kjgQzRC3bHGiTM1FZBDa

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      431c2c4b3f9bbefd63dbf6db93d42bde3d674c13aaf86409622b7dc372c37868.exe

    • Size

      1.7MB

    • MD5

      f6e380fc4237efa20d388d1e1cdbeea6

    • SHA1

      eae29f3c97c9276b089dc7d186ab5fae60532f95

    • SHA256

      431c2c4b3f9bbefd63dbf6db93d42bde3d674c13aaf86409622b7dc372c37868

    • SHA512

      4edb91237f0f2645170c4678818b87c84ce80bd63643e3942a716c273e80da1e664c3054e81ccb33129585bc1376480af366b45cd1c148be2a040af70f885581

    • SSDEEP

      49152:cpFAWg/4zXBC3cKxItsXGiTM1FXpgIHjLDDG:kjgQzRC3bHGiTM1FZBDa

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks