General

  • Target

    78b460fe07346dc517a238c241ec02d8ae1181f9120fd8d0a88ba6571620fec6.exe

  • Size

    1.7MB

  • Sample

    241214-n5fbns1lft

  • MD5

    c70c219d988415347561167abd815428

  • SHA1

    7672b4f7f1bec1fb679b75d8b056de1e22cf8c86

  • SHA256

    78b460fe07346dc517a238c241ec02d8ae1181f9120fd8d0a88ba6571620fec6

  • SHA512

    6cb316fa378dd96d4e67aa5f3ff60a975ddfc4a655dce32cd927dd059a13d419cb028a75982e3e3d72cdfd97f5fe4f4cc795660955a893ff4700bb8513e494e6

  • SSDEEP

    49152:BOyuxSL5M6Wl5/wAfKXRM9wwT8EDl1oe:BOaFvu5oAR9wwAS

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      78b460fe07346dc517a238c241ec02d8ae1181f9120fd8d0a88ba6571620fec6.exe

    • Size

      1.7MB

    • MD5

      c70c219d988415347561167abd815428

    • SHA1

      7672b4f7f1bec1fb679b75d8b056de1e22cf8c86

    • SHA256

      78b460fe07346dc517a238c241ec02d8ae1181f9120fd8d0a88ba6571620fec6

    • SHA512

      6cb316fa378dd96d4e67aa5f3ff60a975ddfc4a655dce32cd927dd059a13d419cb028a75982e3e3d72cdfd97f5fe4f4cc795660955a893ff4700bb8513e494e6

    • SSDEEP

      49152:BOyuxSL5M6Wl5/wAfKXRM9wwT8EDl1oe:BOaFvu5oAR9wwAS

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks