General

  • Target

    cd7f5c4f492d5d2e9fbf4a91de8a6e038d177a2ef2bcc916ab9ccc5f996421b2

  • Size

    1.7MB

  • Sample

    250125-bqkxdsyjdz

  • MD5

    9f930d4b2cecf249e5f18e18e3928c9f

  • SHA1

    94724f567e44b85847c8a39840a8a898904f1b8d

  • SHA256

    cd7f5c4f492d5d2e9fbf4a91de8a6e038d177a2ef2bcc916ab9ccc5f996421b2

  • SHA512

    091482a3475b76f1591341f3b121b8ff142ab33e62935e513ae2e8a0cc6308e9ebcc259567818cf6b78a5e79e68efaffa110eecac125e88a1935ffbdcd37c91e

  • SSDEEP

    24576:N8DrG2Mbo6t2p6ZENcSmPUaqppw0sQ+Jh4Kx2YZ0Hn8Wpky9RmsTHVzKVXNdg0:Nf/c6t1Z7SmPzqpdw4q2eWNPV2Xbg

Malware Config

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      cd7f5c4f492d5d2e9fbf4a91de8a6e038d177a2ef2bcc916ab9ccc5f996421b2

    • Size

      1.7MB

    • MD5

      9f930d4b2cecf249e5f18e18e3928c9f

    • SHA1

      94724f567e44b85847c8a39840a8a898904f1b8d

    • SHA256

      cd7f5c4f492d5d2e9fbf4a91de8a6e038d177a2ef2bcc916ab9ccc5f996421b2

    • SHA512

      091482a3475b76f1591341f3b121b8ff142ab33e62935e513ae2e8a0cc6308e9ebcc259567818cf6b78a5e79e68efaffa110eecac125e88a1935ffbdcd37c91e

    • SSDEEP

      24576:N8DrG2Mbo6t2p6ZENcSmPUaqppw0sQ+Jh4Kx2YZ0Hn8Wpky9RmsTHVzKVXNdg0:Nf/c6t1Z7SmPzqpdw4q2eWNPV2Xbg

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks