General

  • Target

    55a6c04ca7724acad83455b0a8d511c8d441db88f0400b9561d28ce99328651fN.exe

  • Size

    2.8MB

  • Sample

    241220-g2sn9s1qgs

  • MD5

    da93826871d0494e34217aa103204590

  • SHA1

    2ad0fc0b3ccd0e94d9f6fed37eda17b78b974e7a

  • SHA256

    55a6c04ca7724acad83455b0a8d511c8d441db88f0400b9561d28ce99328651f

  • SHA512

    78eb291bbefee07a5a8b4ccaf0a0a2f7ba808f7ac9a0eabbcec67e1d94076f4ff8fbb2508947b708bcc0a8691c7f94c02770a93346d582c390a80ae48845dee2

  • SSDEEP

    49152:lVDwwgoR9EGV1gTxZ/vjNzdrqZ8HS1nDunYxV3j9tn:vDwwgoR9RV1gVZ3jNzdrPKKY/TDn

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      55a6c04ca7724acad83455b0a8d511c8d441db88f0400b9561d28ce99328651fN.exe

    • Size

      2.8MB

    • MD5

      da93826871d0494e34217aa103204590

    • SHA1

      2ad0fc0b3ccd0e94d9f6fed37eda17b78b974e7a

    • SHA256

      55a6c04ca7724acad83455b0a8d511c8d441db88f0400b9561d28ce99328651f

    • SHA512

      78eb291bbefee07a5a8b4ccaf0a0a2f7ba808f7ac9a0eabbcec67e1d94076f4ff8fbb2508947b708bcc0a8691c7f94c02770a93346d582c390a80ae48845dee2

    • SSDEEP

      49152:lVDwwgoR9EGV1gTxZ/vjNzdrqZ8HS1nDunYxV3j9tn:vDwwgoR9RV1gVZ3jNzdrPKKY/TDn

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks