General

  • Target

    ad3b0cdf3edd2264fc40e1470537c7a6255077c7f2f0611cede7b66fb92e23ccN.exe

  • Size

    1.7MB

  • Sample

    250119-t7f9mswnd1

  • MD5

    dab07ff32fc73f8c6baf669590650bc0

  • SHA1

    41ef8db60d427ad89ea1399454ffc968562e6204

  • SHA256

    ad3b0cdf3edd2264fc40e1470537c7a6255077c7f2f0611cede7b66fb92e23cc

  • SHA512

    26718e7ae690c0c403c7dda62676fc89c4c714c3b1fb2fdc71f1b272500ebb27e6f468b1a27c9d8131cb25742594a1f682bf86e231f08f927f2da601f5317cb2

  • SSDEEP

    24576:T9qIX5BrT6joVQjxCt7GzRiigfJI2hz+exIs7mm331/0+WeQbePXljEKmdocwCtq:0IjSmMf2JIy+vbmV/8bePVjEKm75

Malware Config

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      ad3b0cdf3edd2264fc40e1470537c7a6255077c7f2f0611cede7b66fb92e23ccN.exe

    • Size

      1.7MB

    • MD5

      dab07ff32fc73f8c6baf669590650bc0

    • SHA1

      41ef8db60d427ad89ea1399454ffc968562e6204

    • SHA256

      ad3b0cdf3edd2264fc40e1470537c7a6255077c7f2f0611cede7b66fb92e23cc

    • SHA512

      26718e7ae690c0c403c7dda62676fc89c4c714c3b1fb2fdc71f1b272500ebb27e6f468b1a27c9d8131cb25742594a1f682bf86e231f08f927f2da601f5317cb2

    • SSDEEP

      24576:T9qIX5BrT6joVQjxCt7GzRiigfJI2hz+exIs7mm331/0+WeQbePXljEKmdocwCtq:0IjSmMf2JIy+vbmV/8bePVjEKm75

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks