Resubmissions

16-12-2024 13:56

241216-q8x21asqfm 10

16-12-2024 13:46

241216-q3fkrsspfl 10

General

  • Target

    03b0ee461554c9ecfcc906404caf95247f39959ad36fff125722870f27efa0b5

  • Size

    1.7MB

  • Sample

    241216-q8x21asqfm

  • MD5

    e328245a28e6a2cdb14bde4d150a342e

  • SHA1

    c768975f4fe3deed8d1cc677c8ada7395a394865

  • SHA256

    03b0ee461554c9ecfcc906404caf95247f39959ad36fff125722870f27efa0b5

  • SHA512

    4d6ad474e969cb85b29bc6319f6e84151d3267cc2ed28b22fb1b11d7e28597c98a1b2405eace53ca42cb1c5f77723fca3bf03bdaff243861593d00bf57e84ac0

  • SSDEEP

    49152:/i7b2qdjAjGhlEBDQFrdjVytT94WtF7oOKL:xqp+BsHV4KWtF7oO

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      03b0ee461554c9ecfcc906404caf95247f39959ad36fff125722870f27efa0b5

    • Size

      1.7MB

    • MD5

      e328245a28e6a2cdb14bde4d150a342e

    • SHA1

      c768975f4fe3deed8d1cc677c8ada7395a394865

    • SHA256

      03b0ee461554c9ecfcc906404caf95247f39959ad36fff125722870f27efa0b5

    • SHA512

      4d6ad474e969cb85b29bc6319f6e84151d3267cc2ed28b22fb1b11d7e28597c98a1b2405eace53ca42cb1c5f77723fca3bf03bdaff243861593d00bf57e84ac0

    • SSDEEP

      49152:/i7b2qdjAjGhlEBDQFrdjVytT94WtF7oOKL:xqp+BsHV4KWtF7oO

    • Modifies visibility of file extensions in Explorer

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • UAC bypass

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Renames multiple (89) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks