General

  • Target

    c7107e5b4a7a6a36e7d841c528056fc8748e4350ec6b3824be7b7b45e3778676

  • Size

    5.0MB

  • Sample

    241226-3wx8fsvrgn

  • MD5

    de1d6ba5a3d41a8fa2d97694efcc0a5d

  • SHA1

    234a176f9f778db7a8639f7450289d426421e324

  • SHA256

    c7107e5b4a7a6a36e7d841c528056fc8748e4350ec6b3824be7b7b45e3778676

  • SHA512

    c4bfc293f58fdbaaf081ba91f2303d7ad7505faecd49200187f1ab94f9c79b6d95a570cb673fd97762919d622e2def3dd513aa71576e00b2b898362503d1d502

  • SSDEEP

    49152:68cvcusKwUPK4N5MQ+2+e9jbb5gyczD+iZ:63vcusKwUPK4N5MQ+1eJH5gbzqi

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      c7107e5b4a7a6a36e7d841c528056fc8748e4350ec6b3824be7b7b45e3778676

    • Size

      5.0MB

    • MD5

      de1d6ba5a3d41a8fa2d97694efcc0a5d

    • SHA1

      234a176f9f778db7a8639f7450289d426421e324

    • SHA256

      c7107e5b4a7a6a36e7d841c528056fc8748e4350ec6b3824be7b7b45e3778676

    • SHA512

      c4bfc293f58fdbaaf081ba91f2303d7ad7505faecd49200187f1ab94f9c79b6d95a570cb673fd97762919d622e2def3dd513aa71576e00b2b898362503d1d502

    • SSDEEP

      49152:68cvcusKwUPK4N5MQ+2+e9jbb5gyczD+iZ:63vcusKwUPK4N5MQ+1eJH5gbzqi

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks