General

  • Target

    33c2bf98bb8da8afa179fd90efc0b686e9eca69ffa2ab5b8163ece46a90ff561

  • Size

    2.1MB

  • Sample

    241121-pcwzdssfnm

  • MD5

    37ad51a72ae2ee4f18f90db961ca42e0

  • SHA1

    4e981723fa01e7aa8f81b23c734a13b2cdb9e252

  • SHA256

    33c2bf98bb8da8afa179fd90efc0b686e9eca69ffa2ab5b8163ece46a90ff561

  • SHA512

    83a764e4ff347912c558aaa79d99144ab43d4212fc9275fc14053dcd6c3a5544fb83aeef50fa8b9c85a6eb436346e58d1e436bf2a45d5365ed50a9dc9db96d68

  • SSDEEP

    49152:JbaU4vJCi2C95vOT/gbQcbYa3CSjw0zCGT:wU4vJC25WUUsJPzCG

Malware Config

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Targets

    • Target

      33c2bf98bb8da8afa179fd90efc0b686e9eca69ffa2ab5b8163ece46a90ff561

    • Size

      2.1MB

    • MD5

      37ad51a72ae2ee4f18f90db961ca42e0

    • SHA1

      4e981723fa01e7aa8f81b23c734a13b2cdb9e252

    • SHA256

      33c2bf98bb8da8afa179fd90efc0b686e9eca69ffa2ab5b8163ece46a90ff561

    • SHA512

      83a764e4ff347912c558aaa79d99144ab43d4212fc9275fc14053dcd6c3a5544fb83aeef50fa8b9c85a6eb436346e58d1e436bf2a45d5365ed50a9dc9db96d68

    • SSDEEP

      49152:JbaU4vJCi2C95vOT/gbQcbYa3CSjw0zCGT:wU4vJC25WUUsJPzCG

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks