General

  • Target

    573fc7284a73ec6c0e91b3345398f4fd3e95cf844478e1a7e5108be9b830649d

  • Size

    1.7MB

  • Sample

    250125-t1ga3a1lbt

  • MD5

    40399761773e9f8ccc6cd5acb5989a8e

  • SHA1

    b303e638c514e49ae097b41ffcd3799a92f31e6f

  • SHA256

    573fc7284a73ec6c0e91b3345398f4fd3e95cf844478e1a7e5108be9b830649d

  • SHA512

    5940b2ba6603bf9c1a39e56cc3107ddaa8c24e0d72babe4d4d47bcd91a9213d777a85bb2f0c60b04b249846fdeeb59e27c49e7f31d3a1fab96f00d702b115885

  • SSDEEP

    49152:c4rF3J0SdMVWx6u7I+NLLgYFwUDE6nSE:9JMc7HgYF7RS

Malware Config

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      573fc7284a73ec6c0e91b3345398f4fd3e95cf844478e1a7e5108be9b830649d

    • Size

      1.7MB

    • MD5

      40399761773e9f8ccc6cd5acb5989a8e

    • SHA1

      b303e638c514e49ae097b41ffcd3799a92f31e6f

    • SHA256

      573fc7284a73ec6c0e91b3345398f4fd3e95cf844478e1a7e5108be9b830649d

    • SHA512

      5940b2ba6603bf9c1a39e56cc3107ddaa8c24e0d72babe4d4d47bcd91a9213d777a85bb2f0c60b04b249846fdeeb59e27c49e7f31d3a1fab96f00d702b115885

    • SSDEEP

      49152:c4rF3J0SdMVWx6u7I+NLLgYFwUDE6nSE:9JMc7HgYF7RS

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks