General

  • Target

    9ae7c0e6dd75413b2613982cfa3f45ec27e5d069f8516f9a0bd74d11d52bda73.exe

  • Size

    1.7MB

  • Sample

    241124-np964sxnez

  • MD5

    5260487861069ff2cbec2d4b822a7299

  • SHA1

    3cfa4bcc01c7393e3aee3214b785e7187583fe73

  • SHA256

    9ae7c0e6dd75413b2613982cfa3f45ec27e5d069f8516f9a0bd74d11d52bda73

  • SHA512

    598a72f7bbd64323b10d15a655551502604c9430b4180575153a0bf14e8bbd17bcb1018e44bcd7450c37272e9815025e394c679f491da5cbfa1b2e52f10dd541

  • SSDEEP

    49152:rzSKrMtbWWUPPNOktOLuVecLwj5PTdWdeENnSHRJ8:rm0RbOLuVlLMRTdWYENSH4

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      9ae7c0e6dd75413b2613982cfa3f45ec27e5d069f8516f9a0bd74d11d52bda73.exe

    • Size

      1.7MB

    • MD5

      5260487861069ff2cbec2d4b822a7299

    • SHA1

      3cfa4bcc01c7393e3aee3214b785e7187583fe73

    • SHA256

      9ae7c0e6dd75413b2613982cfa3f45ec27e5d069f8516f9a0bd74d11d52bda73

    • SHA512

      598a72f7bbd64323b10d15a655551502604c9430b4180575153a0bf14e8bbd17bcb1018e44bcd7450c37272e9815025e394c679f491da5cbfa1b2e52f10dd541

    • SSDEEP

      49152:rzSKrMtbWWUPPNOktOLuVecLwj5PTdWdeENnSHRJ8:rm0RbOLuVlLMRTdWYENSH4

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks