General

  • Target

    file.exe

  • Size

    1.7MB

  • Sample

    241124-f5eq5sslgp

  • MD5

    85c52cefa22a78fcbd9b6fd8ee2d5e50

  • SHA1

    f40c5b7bd336b4fb5b187602e68045a091137126

  • SHA256

    5323c3c7c0c60e5e69b8b5eeb05dffc8ce3bbeb52335bc5ed51f7179186d7df9

  • SHA512

    18cd50049c383dd5731b4fffb32336e6ef456782bc8356e8c24ef2c9e7e54873515f7513ce22b78b173973469356023053e7ee213c481d3b54387c840a7e3c2e

  • SSDEEP

    24576:1fm0AvMzGKZGy4TAzsTwt3/EZRcF2bN7LKGRvr2F21WUL0GqgsG+4hNIS0m+UmmU:1fAvMzGAtf4C8bi2bN731WY0G2nS0Sj

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      file.exe

    • Size

      1.7MB

    • MD5

      85c52cefa22a78fcbd9b6fd8ee2d5e50

    • SHA1

      f40c5b7bd336b4fb5b187602e68045a091137126

    • SHA256

      5323c3c7c0c60e5e69b8b5eeb05dffc8ce3bbeb52335bc5ed51f7179186d7df9

    • SHA512

      18cd50049c383dd5731b4fffb32336e6ef456782bc8356e8c24ef2c9e7e54873515f7513ce22b78b173973469356023053e7ee213c481d3b54387c840a7e3c2e

    • SSDEEP

      24576:1fm0AvMzGKZGy4TAzsTwt3/EZRcF2bN7LKGRvr2F21WUL0GqgsG+4hNIS0m+UmmU:1fAvMzGAtf4C8bi2bN731WY0G2nS0Sj

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks