General

  • Target

    bbdfa1ef7606a0c5d2dc540fe44628f7fcba58eb023e2f93ba7ffbac5282c0ad

  • Size

    1.7MB

  • Sample

    250126-svjcsswnbn

  • MD5

    ceede8c737ef432d27c0679ca1b1f43e

  • SHA1

    ff534a6f0aa0d696739a73d9b731a3f683ba43c3

  • SHA256

    bbdfa1ef7606a0c5d2dc540fe44628f7fcba58eb023e2f93ba7ffbac5282c0ad

  • SHA512

    e879137c7022190e3ebad6a0b371b12cd545e47555c38f57285383b33c85fa643fcacb775946528c7591f71ce443311cd927b58a1912fc19140adf86544e8af6

  • SSDEEP

    49152:n677HVAo8FJiRnCrdrDDqkE+BqnjaXPC+LMDvnEQx:n6dL8+RnCr5DDqkVm2XvYDMi

Malware Config

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      bbdfa1ef7606a0c5d2dc540fe44628f7fcba58eb023e2f93ba7ffbac5282c0ad

    • Size

      1.7MB

    • MD5

      ceede8c737ef432d27c0679ca1b1f43e

    • SHA1

      ff534a6f0aa0d696739a73d9b731a3f683ba43c3

    • SHA256

      bbdfa1ef7606a0c5d2dc540fe44628f7fcba58eb023e2f93ba7ffbac5282c0ad

    • SHA512

      e879137c7022190e3ebad6a0b371b12cd545e47555c38f57285383b33c85fa643fcacb775946528c7591f71ce443311cd927b58a1912fc19140adf86544e8af6

    • SSDEEP

      49152:n677HVAo8FJiRnCrdrDDqkE+BqnjaXPC+LMDvnEQx:n6dL8+RnCr5DDqkVm2XvYDMi

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks