General

  • Target

    69d63576968a32f9c76ca14bbf10993300fe50799a396f87ca58612c8838ef2f

  • Size

    2.8MB

  • Sample

    241226-gd4fvsxqhx

  • MD5

    6573693c2c60cf961bccc52212548798

  • SHA1

    2feebb1fa6bb01383984b487e81a2ea95a30dd46

  • SHA256

    69d63576968a32f9c76ca14bbf10993300fe50799a396f87ca58612c8838ef2f

  • SHA512

    8da5314aef5c69193589a49db2eeb8853c4ac1acabb823ec4be0acc4b9683b4e8c4c686dff134c44a8191008c5b6dbf1484b163a418e1f160524927afe6bd420

  • SSDEEP

    24576:m/voM07L1LfFKO6tTJ53+tE6kLT+5KEY+Hz8846amFUfxqYOmsrEp+9ZCkgG7RzZ:JMg1Lfsv3B7cHYO0x4msrvZCTKR5bnD

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      69d63576968a32f9c76ca14bbf10993300fe50799a396f87ca58612c8838ef2f

    • Size

      2.8MB

    • MD5

      6573693c2c60cf961bccc52212548798

    • SHA1

      2feebb1fa6bb01383984b487e81a2ea95a30dd46

    • SHA256

      69d63576968a32f9c76ca14bbf10993300fe50799a396f87ca58612c8838ef2f

    • SHA512

      8da5314aef5c69193589a49db2eeb8853c4ac1acabb823ec4be0acc4b9683b4e8c4c686dff134c44a8191008c5b6dbf1484b163a418e1f160524927afe6bd420

    • SSDEEP

      24576:m/voM07L1LfFKO6tTJ53+tE6kLT+5KEY+Hz8846amFUfxqYOmsrEp+9ZCkgG7RzZ:JMg1Lfsv3B7cHYO0x4msrvZCTKR5bnD

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks