General

  • Target

    0b5b74e7fc7666df3db159f281f4a61b2a7f8ca47831e8e3b90f5b39b44df886

  • Size

    1.7MB

  • Sample

    241212-mz5hya1qcv

  • MD5

    72c346b7f790702bee68e6c489021308

  • SHA1

    5732e7a88f0ba6c86da7a528c6b7fbb476ee599f

  • SHA256

    0b5b74e7fc7666df3db159f281f4a61b2a7f8ca47831e8e3b90f5b39b44df886

  • SHA512

    2c35311199d513c65c7cebcbf44fe496a7e7c97351820f5ecd20b8c26bac7f459e87b39159c529d0bff7e598083405322eba94b6e2aaf015fca37a081a7f6c00

  • SSDEEP

    49152:9MDuN0IuA3Rpuui2QMM8BdMrsEoac+Sj32CZOFy1DOe:9a+003GuiEZISaNqEsF

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      0b5b74e7fc7666df3db159f281f4a61b2a7f8ca47831e8e3b90f5b39b44df886

    • Size

      1.7MB

    • MD5

      72c346b7f790702bee68e6c489021308

    • SHA1

      5732e7a88f0ba6c86da7a528c6b7fbb476ee599f

    • SHA256

      0b5b74e7fc7666df3db159f281f4a61b2a7f8ca47831e8e3b90f5b39b44df886

    • SHA512

      2c35311199d513c65c7cebcbf44fe496a7e7c97351820f5ecd20b8c26bac7f459e87b39159c529d0bff7e598083405322eba94b6e2aaf015fca37a081a7f6c00

    • SSDEEP

      49152:9MDuN0IuA3Rpuui2QMM8BdMrsEoac+Sj32CZOFy1DOe:9a+003GuiEZISaNqEsF

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks