General

  • Target

    4f3f3cebaedafaca661c5852c61b1cc62377805ddb893891c795097cc4d90216N.exe

  • Size

    1.7MB

  • Sample

    241216-nf9tzszjan

  • MD5

    0db86f415beec566f74ae32230607940

  • SHA1

    59ad2e80445397031efa8cb4cf90488ca03e809e

  • SHA256

    4f3f3cebaedafaca661c5852c61b1cc62377805ddb893891c795097cc4d90216

  • SHA512

    b4f1fe2f7805091a7fd6611dede047f35fa403770f6351bf3cba4243a74d4539bd84cb687569b60c7a58b8664f549202b4009c75cc82392a5b16507c7f8dfaf8

  • SSDEEP

    49152:5wOCR5yKSE9XasSCdEFq1/ZSgofTy8unwLS8u7G:0R57DSQ/ZSgoGRnwxu

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      4f3f3cebaedafaca661c5852c61b1cc62377805ddb893891c795097cc4d90216N.exe

    • Size

      1.7MB

    • MD5

      0db86f415beec566f74ae32230607940

    • SHA1

      59ad2e80445397031efa8cb4cf90488ca03e809e

    • SHA256

      4f3f3cebaedafaca661c5852c61b1cc62377805ddb893891c795097cc4d90216

    • SHA512

      b4f1fe2f7805091a7fd6611dede047f35fa403770f6351bf3cba4243a74d4539bd84cb687569b60c7a58b8664f549202b4009c75cc82392a5b16507c7f8dfaf8

    • SSDEEP

      49152:5wOCR5yKSE9XasSCdEFq1/ZSgofTy8unwLS8u7G:0R57DSQ/ZSgoGRnwxu

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks