General

  • Target

    385057393bd0f229405d31ff87797fbadfb4e410f4cd9c676fa03d52302a19e6

  • Size

    1.7MB

  • Sample

    241120-jpan2avarj

  • MD5

    4af4fd1359ae8fae97130ce218f55035

  • SHA1

    423eff555900f795dda17a065b6e46e76d11b2ab

  • SHA256

    385057393bd0f229405d31ff87797fbadfb4e410f4cd9c676fa03d52302a19e6

  • SHA512

    63b4a2e820db97deb4b4119ab2759ff3212c5bd0b6dd21deaad403729ccd1f06f6d4c267adba3e920ab1ce13b611a56fdd8aa79241ebdf3db039fb2212a21f21

  • SSDEEP

    49152:/eO2qj9oTQdX7HCYO6pNSdhxTSw+8clerl7PZ6DzLT0:yqjzd+YOQ8dhBU7li7aX0

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      385057393bd0f229405d31ff87797fbadfb4e410f4cd9c676fa03d52302a19e6

    • Size

      1.7MB

    • MD5

      4af4fd1359ae8fae97130ce218f55035

    • SHA1

      423eff555900f795dda17a065b6e46e76d11b2ab

    • SHA256

      385057393bd0f229405d31ff87797fbadfb4e410f4cd9c676fa03d52302a19e6

    • SHA512

      63b4a2e820db97deb4b4119ab2759ff3212c5bd0b6dd21deaad403729ccd1f06f6d4c267adba3e920ab1ce13b611a56fdd8aa79241ebdf3db039fb2212a21f21

    • SSDEEP

      49152:/eO2qj9oTQdX7HCYO6pNSdhxTSw+8clerl7PZ6DzLT0:yqjzd+YOQ8dhBU7li7aX0

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks