General

  • Target

    308d03c0a0145f5b8ec0483534177c69ccf41ec103da8648f5b7fd9de50db2a4

  • Size

    1.7MB

  • Sample

    250107-pdz3fasnbm

  • MD5

    1010fe1b9353aa5fdbed0a82c5cc27ea

  • SHA1

    61a021fbdfe2f0a30f35080c9b37901e871f7a55

  • SHA256

    308d03c0a0145f5b8ec0483534177c69ccf41ec103da8648f5b7fd9de50db2a4

  • SHA512

    f2b175cca0baf75315226284ea8db26ff89f25d7c596e2e007a473dd8ecf066eb4bd12ffeef88c21073d68f965d8d15a3cb07b6615226e228efe87c2f8d89522

  • SSDEEP

    49152:Ag9v2aGQgJVDPOVGLrKzQUscF7qIplWYRX0p:6LmVIdDchq85VO

Malware Config

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      308d03c0a0145f5b8ec0483534177c69ccf41ec103da8648f5b7fd9de50db2a4

    • Size

      1.7MB

    • MD5

      1010fe1b9353aa5fdbed0a82c5cc27ea

    • SHA1

      61a021fbdfe2f0a30f35080c9b37901e871f7a55

    • SHA256

      308d03c0a0145f5b8ec0483534177c69ccf41ec103da8648f5b7fd9de50db2a4

    • SHA512

      f2b175cca0baf75315226284ea8db26ff89f25d7c596e2e007a473dd8ecf066eb4bd12ffeef88c21073d68f965d8d15a3cb07b6615226e228efe87c2f8d89522

    • SSDEEP

      49152:Ag9v2aGQgJVDPOVGLrKzQUscF7qIplWYRX0p:6LmVIdDchq85VO

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks