General

  • Target

    file.exe

  • Size

    1.7MB

  • Sample

    241124-y14tkstldj

  • MD5

    39415437759ea288bb81b2e0dbca0bed

  • SHA1

    9f6228d33c548adc3dbcbaac70eb1de90cab9970

  • SHA256

    6bfcda923115e6d7c292c625207c3b0ca324c7610150e0c743b279b60e592b6e

  • SHA512

    61d83bc03d9564d6e30094a4c20544ee3025b50574c0b431a5b08430aac79478079e701882bd0b450bfe1a546c02999ab9bd2f34e8ef6afb9340410be972428f

  • SSDEEP

    24576:pI9pJEQwooMNV4GSirqAF5Wz2ZUOTj5x+Ew2LWr3ZdlJX8FAQEAX8Tg8MlV3kR:spGooMZSimsWzarwB3ZLh8uQEAX1vo

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      file.exe

    • Size

      1.7MB

    • MD5

      39415437759ea288bb81b2e0dbca0bed

    • SHA1

      9f6228d33c548adc3dbcbaac70eb1de90cab9970

    • SHA256

      6bfcda923115e6d7c292c625207c3b0ca324c7610150e0c743b279b60e592b6e

    • SHA512

      61d83bc03d9564d6e30094a4c20544ee3025b50574c0b431a5b08430aac79478079e701882bd0b450bfe1a546c02999ab9bd2f34e8ef6afb9340410be972428f

    • SSDEEP

      24576:pI9pJEQwooMNV4GSirqAF5Wz2ZUOTj5x+Ew2LWr3ZdlJX8FAQEAX8Tg8MlV3kR:spGooMZSimsWzarwB3ZLh8uQEAX1vo

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks