General

  • Target

    bbe59338533d1e313bd878a3507fdbfe04e7b187d07f154c73c5bfe9c54bf260

  • Size

    1.7MB

  • Sample

    250109-xn435szmhq

  • MD5

    ce7750d50c56a9cb1e863c7f90cf0030

  • SHA1

    2127ed24bdc4bc37950941376cb25d4b72abaad6

  • SHA256

    bbe59338533d1e313bd878a3507fdbfe04e7b187d07f154c73c5bfe9c54bf260

  • SHA512

    578d9c7063515ba148a9046376a5c18795814c3b729baa72eb4aead14d1f374d8ca5e07a5c0783adfd1d3ac7a96d901c2600cf418ad024708599b74b6f0fce91

  • SSDEEP

    24576:p1Oihl9F65Hoji3BaJWg995vIBtnzsWnsOhxxc+X1CQmXATwSgjdElsoA:p1O2565H8i3Baz93OtnSGo+B04lso

Malware Config

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      bbe59338533d1e313bd878a3507fdbfe04e7b187d07f154c73c5bfe9c54bf260

    • Size

      1.7MB

    • MD5

      ce7750d50c56a9cb1e863c7f90cf0030

    • SHA1

      2127ed24bdc4bc37950941376cb25d4b72abaad6

    • SHA256

      bbe59338533d1e313bd878a3507fdbfe04e7b187d07f154c73c5bfe9c54bf260

    • SHA512

      578d9c7063515ba148a9046376a5c18795814c3b729baa72eb4aead14d1f374d8ca5e07a5c0783adfd1d3ac7a96d901c2600cf418ad024708599b74b6f0fce91

    • SSDEEP

      24576:p1Oihl9F65Hoji3BaJWg995vIBtnzsWnsOhxxc+X1CQmXATwSgjdElsoA:p1O2565H8i3Baz93OtnSGo+B04lso

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks