General

  • Target

    22cbcc0e6cb62586554aeab4535bce889051dd957114ce9260cb3d94a2e31087

  • Size

    5.0MB

  • Sample

    241226-3k5hdsvngp

  • MD5

    488164e9714fe64c05540590ffe28999

  • SHA1

    9c35653fcf4178c463647f1d4dc3cc5a9c129487

  • SHA256

    22cbcc0e6cb62586554aeab4535bce889051dd957114ce9260cb3d94a2e31087

  • SHA512

    ef8eb1f2efba519bc4204664747009ccbdc9c0b9413db4ab234032af767a5f2ab799f76707898a91079fd70d1d29b4d4805065011c6da3b7a81ce32b299a6b5a

  • SSDEEP

    24576:i2NPzsPBpA5Dl5pzuDpdndfbFSGmkkYJdIHFKSmEApnBF6l3cEugbu6T1/bknsnL:igg6hbupdn2zkkY4lccbNfnPr8XYw

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      22cbcc0e6cb62586554aeab4535bce889051dd957114ce9260cb3d94a2e31087

    • Size

      5.0MB

    • MD5

      488164e9714fe64c05540590ffe28999

    • SHA1

      9c35653fcf4178c463647f1d4dc3cc5a9c129487

    • SHA256

      22cbcc0e6cb62586554aeab4535bce889051dd957114ce9260cb3d94a2e31087

    • SHA512

      ef8eb1f2efba519bc4204664747009ccbdc9c0b9413db4ab234032af767a5f2ab799f76707898a91079fd70d1d29b4d4805065011c6da3b7a81ce32b299a6b5a

    • SSDEEP

      24576:i2NPzsPBpA5Dl5pzuDpdndfbFSGmkkYJdIHFKSmEApnBF6l3cEugbu6T1/bknsnL:igg6hbupdn2zkkY4lccbNfnPr8XYw

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks