General

  • Target

    872c127d2bb34a02db6eef9968757c28fc382988a9751644d4614cb02b280bd9

  • Size

    1.7MB

  • Sample

    250127-fm9tkatldq

  • MD5

    9eb61a68b5cf71aa89c3eea26e73ed63

  • SHA1

    1130623e6184bf939b311d924f111fe4a71a6125

  • SHA256

    872c127d2bb34a02db6eef9968757c28fc382988a9751644d4614cb02b280bd9

  • SHA512

    556a773771d1ebff579a5624ccb36dfff706aad134e0627a1caa1187992107fc8b8f5e72cf43bdeba7c80727a84a89e8f57f895909fa36cadab242ecd63d67a3

  • SSDEEP

    24576:uqujm7pY7c14vpYi4TNZ3KZxQ0feo4EPCyibrfnDrmGA8s0c4lCo6tMlzhk5jDb0:u5m7pavpYLXajRlJiPn3CoS5jOQ2Mo

Malware Config

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      872c127d2bb34a02db6eef9968757c28fc382988a9751644d4614cb02b280bd9

    • Size

      1.7MB

    • MD5

      9eb61a68b5cf71aa89c3eea26e73ed63

    • SHA1

      1130623e6184bf939b311d924f111fe4a71a6125

    • SHA256

      872c127d2bb34a02db6eef9968757c28fc382988a9751644d4614cb02b280bd9

    • SHA512

      556a773771d1ebff579a5624ccb36dfff706aad134e0627a1caa1187992107fc8b8f5e72cf43bdeba7c80727a84a89e8f57f895909fa36cadab242ecd63d67a3

    • SSDEEP

      24576:uqujm7pY7c14vpYi4TNZ3KZxQ0feo4EPCyibrfnDrmGA8s0c4lCo6tMlzhk5jDb0:u5m7pavpYLXajRlJiPn3CoS5jOQ2Mo

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks