General

  • Target

    file.exe

  • Size

    1.8MB

  • Sample

    241125-qhykvavlhl

  • MD5

    989618b54cbe6d89c30aa67fe52fc62b

  • SHA1

    fb55e89cdd398d44eaf8ce549eff424a7cf47141

  • SHA256

    bee0fe71acfca971ebaf60e73f2026c1612cf89bc26d18e609891dfdaf4ad423

  • SHA512

    7e21675d2ce2f33d5ea3e9219733132cf403be18fd810912da03ac53a32c1e12c7821ff81f26874e2cd61452e5e734263be43f8985fdb7f581ce2d0194cdfba8

  • SSDEEP

    24576:HioExDdUWS9zVES1nFUzbDkTKGE+mxxT+YL68nZ6BkyoOIzd72bO3aS26l:bExG9X1kncufkKOIRs

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      file.exe

    • Size

      1.8MB

    • MD5

      989618b54cbe6d89c30aa67fe52fc62b

    • SHA1

      fb55e89cdd398d44eaf8ce549eff424a7cf47141

    • SHA256

      bee0fe71acfca971ebaf60e73f2026c1612cf89bc26d18e609891dfdaf4ad423

    • SHA512

      7e21675d2ce2f33d5ea3e9219733132cf403be18fd810912da03ac53a32c1e12c7821ff81f26874e2cd61452e5e734263be43f8985fdb7f581ce2d0194cdfba8

    • SSDEEP

      24576:HioExDdUWS9zVES1nFUzbDkTKGE+mxxT+YL68nZ6BkyoOIzd72bO3aS26l:bExG9X1kncufkKOIRs

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks