General

  • Target

    f523464a1a8fab602112da9930216e44fb6013128f393bf6a3a4f51521517d49

  • Size

    1.8MB

  • Sample

    250126-12xsrsxmfp

  • MD5

    389fd6e0b4586061fea1c2cab8d9015b

  • SHA1

    c3799c51e3c03a591cb93e78e12abff8d40ebe43

  • SHA256

    f523464a1a8fab602112da9930216e44fb6013128f393bf6a3a4f51521517d49

  • SHA512

    aa2e56535a92661b31225f5d79fa037cd78b193a0f3c0b1cf910df0ed7392886262c02aac6ce3511cf4ba17086fd0f2849db5d536459524a6f3ad0c946001f4e

  • SSDEEP

    49152:zRtRpu0WhcLiD2bpHXzjuCret2dNiHwHtf2QekMvgtbeL20Z:zRttWiiDup3z6Met2RAbkMvg/

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      f523464a1a8fab602112da9930216e44fb6013128f393bf6a3a4f51521517d49

    • Size

      1.8MB

    • MD5

      389fd6e0b4586061fea1c2cab8d9015b

    • SHA1

      c3799c51e3c03a591cb93e78e12abff8d40ebe43

    • SHA256

      f523464a1a8fab602112da9930216e44fb6013128f393bf6a3a4f51521517d49

    • SHA512

      aa2e56535a92661b31225f5d79fa037cd78b193a0f3c0b1cf910df0ed7392886262c02aac6ce3511cf4ba17086fd0f2849db5d536459524a6f3ad0c946001f4e

    • SSDEEP

      49152:zRtRpu0WhcLiD2bpHXzjuCret2dNiHwHtf2QekMvgtbeL20Z:zRttWiiDup3z6Met2RAbkMvg/

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks