General

  • Target

    3f4854377949e7102dfc608b44c34d33a68fff2363c962d5691233ad2ab53b9b

  • Size

    1.7MB

  • Sample

    250127-e15w4askbp

  • MD5

    5106666e43cfcab287bd26d3c00ba2e4

  • SHA1

    21548b2866ec6e4634ec39b3a67d7e571543ec2a

  • SHA256

    3f4854377949e7102dfc608b44c34d33a68fff2363c962d5691233ad2ab53b9b

  • SHA512

    2a0ddc9c45324fbcd287111c7d4ded31dc17a8c1fc971e3b35cf8d38f980825caa838d2783b0e76eb9a03e8314ce3d29cf5b2e5dd15fd5bb626e9a802ce1919e

  • SSDEEP

    24576:ppHp6SKqhFCUWbouTXpv6GHwJABuVSEtevLoSPSIJaYeI4Qb77EQTsALDBdI6jB:H2qXCUWbXbDwJAPg4aireuoQNbI0

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      3f4854377949e7102dfc608b44c34d33a68fff2363c962d5691233ad2ab53b9b

    • Size

      1.7MB

    • MD5

      5106666e43cfcab287bd26d3c00ba2e4

    • SHA1

      21548b2866ec6e4634ec39b3a67d7e571543ec2a

    • SHA256

      3f4854377949e7102dfc608b44c34d33a68fff2363c962d5691233ad2ab53b9b

    • SHA512

      2a0ddc9c45324fbcd287111c7d4ded31dc17a8c1fc971e3b35cf8d38f980825caa838d2783b0e76eb9a03e8314ce3d29cf5b2e5dd15fd5bb626e9a802ce1919e

    • SSDEEP

      24576:ppHp6SKqhFCUWbouTXpv6GHwJABuVSEtevLoSPSIJaYeI4Qb77EQTsALDBdI6jB:H2qXCUWbXbDwJAPg4aireuoQNbI0

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks