General

  • Target

    2baa3c3f5a7a820dddcb4d8c361cd7b6fa5d14f7a1b0ed4c8b60c1e627d493d2

  • Size

    1.8MB

  • Sample

    250125-jyts9svpdn

  • MD5

    eef42eb83a04eeaa34e9359d7929a3c8

  • SHA1

    5994d5d39e688af5b0df6ecb0f983865a1c4bda4

  • SHA256

    2baa3c3f5a7a820dddcb4d8c361cd7b6fa5d14f7a1b0ed4c8b60c1e627d493d2

  • SHA512

    9961ea4d802f67ee5fea7384515a3ba3f4bbef51180f7567990700f9c25f62b18149ff7b94a066474e5ed8aadcc87938e06d511f0360dcaeac916928ad18bb04

  • SSDEEP

    49152:YdTVnweyOsMQgy/R4QivU99KAHVswBBJ:AwdCQ72QimKoBJ

Malware Config

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      2baa3c3f5a7a820dddcb4d8c361cd7b6fa5d14f7a1b0ed4c8b60c1e627d493d2

    • Size

      1.8MB

    • MD5

      eef42eb83a04eeaa34e9359d7929a3c8

    • SHA1

      5994d5d39e688af5b0df6ecb0f983865a1c4bda4

    • SHA256

      2baa3c3f5a7a820dddcb4d8c361cd7b6fa5d14f7a1b0ed4c8b60c1e627d493d2

    • SHA512

      9961ea4d802f67ee5fea7384515a3ba3f4bbef51180f7567990700f9c25f62b18149ff7b94a066474e5ed8aadcc87938e06d511f0360dcaeac916928ad18bb04

    • SSDEEP

      49152:YdTVnweyOsMQgy/R4QivU99KAHVswBBJ:AwdCQ72QimKoBJ

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks