General

  • Target

    17ee09d8a9c80e91d68ad11fb51a10d21f6debbc7793d6e04e3a9cf0bf4ac3a3

  • Size

    1.7MB

  • Sample

    250127-fjnf6askat

  • MD5

    52ac46f22b9a5c1fd795f96040c152fa

  • SHA1

    3836fb7fb5fcfc0aca64ea7eb131599d5015069a

  • SHA256

    17ee09d8a9c80e91d68ad11fb51a10d21f6debbc7793d6e04e3a9cf0bf4ac3a3

  • SHA512

    47f59e96ac63a752299caccde0cafd6c984d9262d8a642f775d177b53ee47cb5224ad103be4328f5242dd2d8182f8652c8e83025ba567797e18e530022b21b60

  • SSDEEP

    49152:4L/tze/tz0Ys2mvbI8SNtynkiySBmaCBR3ZnLfGlFVm5WF:ei0YbySb0yo3uNZSnVmAF

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      17ee09d8a9c80e91d68ad11fb51a10d21f6debbc7793d6e04e3a9cf0bf4ac3a3

    • Size

      1.7MB

    • MD5

      52ac46f22b9a5c1fd795f96040c152fa

    • SHA1

      3836fb7fb5fcfc0aca64ea7eb131599d5015069a

    • SHA256

      17ee09d8a9c80e91d68ad11fb51a10d21f6debbc7793d6e04e3a9cf0bf4ac3a3

    • SHA512

      47f59e96ac63a752299caccde0cafd6c984d9262d8a642f775d177b53ee47cb5224ad103be4328f5242dd2d8182f8652c8e83025ba567797e18e530022b21b60

    • SSDEEP

      49152:4L/tze/tz0Ys2mvbI8SNtynkiySBmaCBR3ZnLfGlFVm5WF:ei0YbySb0yo3uNZSnVmAF

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks