General

  • Target

    85eddfd1bc8ee556593857c0fd0fc5da0b83f955d12fcc86f05345ddc8cf95a2.exe

  • Size

    1.7MB

  • Sample

    241125-mks7cssldy

  • MD5

    791d24a72397c435b7d5a745755a4b0c

  • SHA1

    cc654d593fc92263f7e0142c5c4bd73f209d6043

  • SHA256

    85eddfd1bc8ee556593857c0fd0fc5da0b83f955d12fcc86f05345ddc8cf95a2

  • SHA512

    814be3f8749069538b68283af2e5cb6b5db60efa1f5511a4e187d23ad974b973cbdd2e29c51523d7597df792be704b2ff34c16db5aee37ebe64d36bf0fdcafe2

  • SSDEEP

    24576:GmWo75/1/t1278AIYO5zFZpi0KoJ71oIrNyxlgFnrrQee9zT50bmji984Y3hpCcJ:GmT51KYxZ40d713KgrSzTYaiBY3PTBv

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      85eddfd1bc8ee556593857c0fd0fc5da0b83f955d12fcc86f05345ddc8cf95a2.exe

    • Size

      1.7MB

    • MD5

      791d24a72397c435b7d5a745755a4b0c

    • SHA1

      cc654d593fc92263f7e0142c5c4bd73f209d6043

    • SHA256

      85eddfd1bc8ee556593857c0fd0fc5da0b83f955d12fcc86f05345ddc8cf95a2

    • SHA512

      814be3f8749069538b68283af2e5cb6b5db60efa1f5511a4e187d23ad974b973cbdd2e29c51523d7597df792be704b2ff34c16db5aee37ebe64d36bf0fdcafe2

    • SSDEEP

      24576:GmWo75/1/t1278AIYO5zFZpi0KoJ71oIrNyxlgFnrrQee9zT50bmji984Y3hpCcJ:GmT51KYxZ40d713KgrSzTYaiBY3PTBv

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks