General

  • Target

    594242f39e0a43970c2c6b459baade07c3cdc8df4dcadf89ad6166dc12d5f16c

  • Size

    4.9MB

  • Sample

    241226-2ehwrstkhp

  • MD5

    97b80e7a522a3d40515e954a1fb4b428

  • SHA1

    a08336fcd36b3fec4efd009375c57f4e7fa452e7

  • SHA256

    594242f39e0a43970c2c6b459baade07c3cdc8df4dcadf89ad6166dc12d5f16c

  • SHA512

    3c58d0092977242a386107e0d74e376de0131523b139e09ba93d5604637af22017c0ec2359c42d1837f775137432efebd898102ce3dc22e66edb45a5f527a204

  • SSDEEP

    24576:hcdSpdXoWs2ps+xunxcADxJN26yU5fd7Kp3fL1AbtY1W2Pb1eDMcPOwEmyrbvpyL:aWRs+hADNj7KD1V+5WFEfxVzT1wG3

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      594242f39e0a43970c2c6b459baade07c3cdc8df4dcadf89ad6166dc12d5f16c

    • Size

      4.9MB

    • MD5

      97b80e7a522a3d40515e954a1fb4b428

    • SHA1

      a08336fcd36b3fec4efd009375c57f4e7fa452e7

    • SHA256

      594242f39e0a43970c2c6b459baade07c3cdc8df4dcadf89ad6166dc12d5f16c

    • SHA512

      3c58d0092977242a386107e0d74e376de0131523b139e09ba93d5604637af22017c0ec2359c42d1837f775137432efebd898102ce3dc22e66edb45a5f527a204

    • SSDEEP

      24576:hcdSpdXoWs2ps+xunxcADxJN26yU5fd7Kp3fL1AbtY1W2Pb1eDMcPOwEmyrbvpyL:aWRs+hADNj7KD1V+5WFEfxVzT1wG3

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks