General

  • Target

    cbb5bcbeefdd8fc1c9b2ad9da9a57acb6fb0bfb9977ab45ac2de1d0af5775fea

  • Size

    1.7MB

  • Sample

    241212-nfmpfsskgx

  • MD5

    3d825663fbbbf51bb81cf21b672a7f83

  • SHA1

    9a04e85cf1635389eeff3bc0ea049d5d03412199

  • SHA256

    cbb5bcbeefdd8fc1c9b2ad9da9a57acb6fb0bfb9977ab45ac2de1d0af5775fea

  • SHA512

    b15c40a1fa36a228c19dc59bf9b1fdf9a528fba7bc400b51b29b7d32a0698bdcd1d1b72c7f5f86348f92bc15021f78cbdb32e732b678c639a58cf0fbb06b7ccb

  • SSDEEP

    24576:v6ebSQWi3ZV1U2I4pqoyac0R9asd3AYr+IMhfJvvbqUM2Yj5IoPY4OrAgjlzA9Ok:BUmZV1bpqoq1MAYWFb5M2yLYjrxlzm

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      cbb5bcbeefdd8fc1c9b2ad9da9a57acb6fb0bfb9977ab45ac2de1d0af5775fea

    • Size

      1.7MB

    • MD5

      3d825663fbbbf51bb81cf21b672a7f83

    • SHA1

      9a04e85cf1635389eeff3bc0ea049d5d03412199

    • SHA256

      cbb5bcbeefdd8fc1c9b2ad9da9a57acb6fb0bfb9977ab45ac2de1d0af5775fea

    • SHA512

      b15c40a1fa36a228c19dc59bf9b1fdf9a528fba7bc400b51b29b7d32a0698bdcd1d1b72c7f5f86348f92bc15021f78cbdb32e732b678c639a58cf0fbb06b7ccb

    • SSDEEP

      24576:v6ebSQWi3ZV1U2I4pqoyac0R9asd3AYr+IMhfJvvbqUM2Yj5IoPY4OrAgjlzA9Ok:BUmZV1bpqoq1MAYWFb5M2yLYjrxlzm

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks