General

  • Target

    99d3be2d553f6653ff839bb1abdb7f81dc9e009d4998f5c4791373c9a546b06b

  • Size

    1.7MB

  • Sample

    250124-12p3xssnaq

  • MD5

    5e357cf303104d8c20dce948abfc1de7

  • SHA1

    229322e761afbc2247f53747fc5e8343dae789f0

  • SHA256

    99d3be2d553f6653ff839bb1abdb7f81dc9e009d4998f5c4791373c9a546b06b

  • SHA512

    352c223b029c5c1ca4204ecc677b14c24cac9d8c57ceb93ea091f1686d6ae3f5a7433192e346ef017d3e165b4def09fa9dfccbf8c840ff936a5a50ef15d1b7eb

  • SSDEEP

    49152:9mapYrydqs3olQlwNRAdfaIMATUyQJWvBy1B+x8+jTx3i:9ppNdqs3olCIIMAIZW81ajTx3

Malware Config

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      99d3be2d553f6653ff839bb1abdb7f81dc9e009d4998f5c4791373c9a546b06b

    • Size

      1.7MB

    • MD5

      5e357cf303104d8c20dce948abfc1de7

    • SHA1

      229322e761afbc2247f53747fc5e8343dae789f0

    • SHA256

      99d3be2d553f6653ff839bb1abdb7f81dc9e009d4998f5c4791373c9a546b06b

    • SHA512

      352c223b029c5c1ca4204ecc677b14c24cac9d8c57ceb93ea091f1686d6ae3f5a7433192e346ef017d3e165b4def09fa9dfccbf8c840ff936a5a50ef15d1b7eb

    • SSDEEP

      49152:9mapYrydqs3olQlwNRAdfaIMATUyQJWvBy1B+x8+jTx3i:9ppNdqs3olCIIMAIZW81ajTx3

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks