General

  • Target

    b7b8f38720ed6b96a5831c7842cd7f72f4211e0ee51026b035ff9ec1e5a1666b

  • Size

    1.7MB

  • Sample

    250126-dgfx7ayret

  • MD5

    66681acae19fc0d643a161c40a25624c

  • SHA1

    973ea10ed4399223032c0b1702a6e8a5807f7182

  • SHA256

    b7b8f38720ed6b96a5831c7842cd7f72f4211e0ee51026b035ff9ec1e5a1666b

  • SHA512

    d5624f7a098f59779bebc3ab1285f3aba309d264d74db95e58d1e40907e1da4116a369b8e5be34421aec27a1fb51506a6af75b921e5eb277443ca4a7a3a6b04d

  • SSDEEP

    49152:+W99f5J9lKBxMLABcHxjrdphMVdHlHXpt7:+of5vlK48axu/Hj

Malware Config

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      b7b8f38720ed6b96a5831c7842cd7f72f4211e0ee51026b035ff9ec1e5a1666b

    • Size

      1.7MB

    • MD5

      66681acae19fc0d643a161c40a25624c

    • SHA1

      973ea10ed4399223032c0b1702a6e8a5807f7182

    • SHA256

      b7b8f38720ed6b96a5831c7842cd7f72f4211e0ee51026b035ff9ec1e5a1666b

    • SHA512

      d5624f7a098f59779bebc3ab1285f3aba309d264d74db95e58d1e40907e1da4116a369b8e5be34421aec27a1fb51506a6af75b921e5eb277443ca4a7a3a6b04d

    • SSDEEP

      49152:+W99f5J9lKBxMLABcHxjrdphMVdHlHXpt7:+of5vlK48axu/Hj

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks