General

  • Target

    46f2afd411f49b3dc2d905990405620b1e367bfa18a9774fbeec905d0b6c48e9

  • Size

    1.7MB

  • Sample

    250103-xpzvta1mcl

  • MD5

    dcbcc6c67e3e57558cd2af1bea9fde49

  • SHA1

    1b3321810cfde6653c1909124295f7f94c8bfee9

  • SHA256

    46f2afd411f49b3dc2d905990405620b1e367bfa18a9774fbeec905d0b6c48e9

  • SHA512

    cc63f2c32735f424796c887a2c56defec0b884942443dc455a4089fd066c0d0bcad58eb15e70f251cf3ddb8a54cb6c1b0b83d99cf46786b9f642d1f21b7aef1b

  • SSDEEP

    24576:YHX8Nf8yf5zHuYAg2izG4qzOF1mjq0YU917qx1sf1dcCzS2DjRmy90Rbr8VJOIP5:A8l1xjuYpEzsm5p/LfkCjP90R/sB0

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      46f2afd411f49b3dc2d905990405620b1e367bfa18a9774fbeec905d0b6c48e9

    • Size

      1.7MB

    • MD5

      dcbcc6c67e3e57558cd2af1bea9fde49

    • SHA1

      1b3321810cfde6653c1909124295f7f94c8bfee9

    • SHA256

      46f2afd411f49b3dc2d905990405620b1e367bfa18a9774fbeec905d0b6c48e9

    • SHA512

      cc63f2c32735f424796c887a2c56defec0b884942443dc455a4089fd066c0d0bcad58eb15e70f251cf3ddb8a54cb6c1b0b83d99cf46786b9f642d1f21b7aef1b

    • SSDEEP

      24576:YHX8Nf8yf5zHuYAg2izG4qzOF1mjq0YU917qx1sf1dcCzS2DjRmy90Rbr8VJOIP5:A8l1xjuYpEzsm5p/LfkCjP90R/sB0

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks