General

  • Target

    b0c84fae2107b2d65d690ebc1c62d5afedd376bdcf7818aaf36614204fdf21de.exe

  • Size

    1.8MB

  • Sample

    241125-mwq65szjak

  • MD5

    e52e506fdf28a1f1d9db6b646e893880

  • SHA1

    dddc42d3312cb43a63afb8ed11c019b1df71295d

  • SHA256

    b0c84fae2107b2d65d690ebc1c62d5afedd376bdcf7818aaf36614204fdf21de

  • SHA512

    730f183893a87a0cb924da05c8b90578e190130db759c8e56f6748a482f0b24a17f3373929f655b552124c692dc45adc3175eadc983f01be3e73aec76302971d

  • SSDEEP

    24576:AP/ZoleUqE2DF297I0b3Y9mtfytfV7NCZK2GUg9Mvd3yE98V7TlkKSmwSYoS922q:WokUqO7I08sZ81IZKJ/9Gy+4no6I4h

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      b0c84fae2107b2d65d690ebc1c62d5afedd376bdcf7818aaf36614204fdf21de.exe

    • Size

      1.8MB

    • MD5

      e52e506fdf28a1f1d9db6b646e893880

    • SHA1

      dddc42d3312cb43a63afb8ed11c019b1df71295d

    • SHA256

      b0c84fae2107b2d65d690ebc1c62d5afedd376bdcf7818aaf36614204fdf21de

    • SHA512

      730f183893a87a0cb924da05c8b90578e190130db759c8e56f6748a482f0b24a17f3373929f655b552124c692dc45adc3175eadc983f01be3e73aec76302971d

    • SSDEEP

      24576:AP/ZoleUqE2DF297I0b3Y9mtfytfV7NCZK2GUg9Mvd3yE98V7TlkKSmwSYoS922q:WokUqO7I08sZ81IZKJ/9Gy+4no6I4h

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks