General

  • Target

    418503e4cb7e887e68b3bca950577dfa83617854af3c733a85a3b8316d4aeb72.exe

  • Size

    1.7MB

  • Sample

    241123-nfqq4szngj

  • MD5

    3eb01f0814cb5f180ce23b8f3e131d23

  • SHA1

    34df178eb27f4db25a5a2fc06c0f346aae9dacf9

  • SHA256

    418503e4cb7e887e68b3bca950577dfa83617854af3c733a85a3b8316d4aeb72

  • SHA512

    7b7c20b23e0b027f4c40658cf9dfea48bfdff003330c8575223aa3fb8227b343ca91c79aa24d0e11054de8ebc50b780a2f826a7cc4ff44d6a3542b19bf25516c

  • SSDEEP

    24576:c52+cO7TgIYuKZmoj0zmtG+ZQRvnL4CZsrhhU/SQ8y9cY2X0YwTuCbINL25O8RdM:vKfYJjYmt44XHaS7yX2Xg1bINLNc6F

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      418503e4cb7e887e68b3bca950577dfa83617854af3c733a85a3b8316d4aeb72.exe

    • Size

      1.7MB

    • MD5

      3eb01f0814cb5f180ce23b8f3e131d23

    • SHA1

      34df178eb27f4db25a5a2fc06c0f346aae9dacf9

    • SHA256

      418503e4cb7e887e68b3bca950577dfa83617854af3c733a85a3b8316d4aeb72

    • SHA512

      7b7c20b23e0b027f4c40658cf9dfea48bfdff003330c8575223aa3fb8227b343ca91c79aa24d0e11054de8ebc50b780a2f826a7cc4ff44d6a3542b19bf25516c

    • SSDEEP

      24576:c52+cO7TgIYuKZmoj0zmtG+ZQRvnL4CZsrhhU/SQ8y9cY2X0YwTuCbINL25O8RdM:vKfYJjYmt44XHaS7yX2Xg1bINLNc6F

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks