General

  • Target

    429dcd707e2b808c2c4810ddf6c1344a2b2cf438527a047c7ce198acbfaf34fe

  • Size

    1.7MB

  • Sample

    250126-wrtwxazlgr

  • MD5

    e874d7327e8378a0ef48c1293a6a1691

  • SHA1

    30960d5c5ebd94b2589f420b444ea0cba8a587bf

  • SHA256

    429dcd707e2b808c2c4810ddf6c1344a2b2cf438527a047c7ce198acbfaf34fe

  • SHA512

    2f743655691cc07b6172df25a2a1e9f6a42f5843e04f4cb698b77a48c5570820d547bee4dcce2bd010749b480aab4230acecd10a8a4c375f6ef1532e5826ed83

  • SSDEEP

    49152:BKNV72tTacT47NhnqK/l9MLzwVjsH/ZxK:BKUYrqsMLzweH/Z

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      429dcd707e2b808c2c4810ddf6c1344a2b2cf438527a047c7ce198acbfaf34fe

    • Size

      1.7MB

    • MD5

      e874d7327e8378a0ef48c1293a6a1691

    • SHA1

      30960d5c5ebd94b2589f420b444ea0cba8a587bf

    • SHA256

      429dcd707e2b808c2c4810ddf6c1344a2b2cf438527a047c7ce198acbfaf34fe

    • SHA512

      2f743655691cc07b6172df25a2a1e9f6a42f5843e04f4cb698b77a48c5570820d547bee4dcce2bd010749b480aab4230acecd10a8a4c375f6ef1532e5826ed83

    • SSDEEP

      49152:BKNV72tTacT47NhnqK/l9MLzwVjsH/ZxK:BKUYrqsMLzweH/Z

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks