General

  • Target

    sample.bin

  • Size

    1.8MB

  • Sample

    250130-1g4qkstkhx

  • MD5

    24f5d47762308c43e34ad9f93a4c3811

  • SHA1

    1756b29d4dc4fba7d0d19347cf6cf549f250e375

  • SHA256

    872c643e80d78523297c4670a7c081bf524de755787ca042dd93b4db9d77db18

  • SHA512

    de8016609c78890af57349dcf58f5c71758f20664bdcc5f789b1d992df9924e48832324950210c44d6d9485fc1f92f99ada2d53aa5cd6386c4e9ef7053543844

  • SSDEEP

    24576:hUOWUMzMMgW1MWsuYl3MDLmYW9Kz4aDwnxruPHHk9EUxjCgAjH9aHfM2OuM3WQRa:hUfUmfgWTYl2xWs8vuPnkNxrIm3SBjN

Malware Config

Extracted

Family

stealc

Botnet

brat

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      sample.bin

    • Size

      1.8MB

    • MD5

      24f5d47762308c43e34ad9f93a4c3811

    • SHA1

      1756b29d4dc4fba7d0d19347cf6cf549f250e375

    • SHA256

      872c643e80d78523297c4670a7c081bf524de755787ca042dd93b4db9d77db18

    • SHA512

      de8016609c78890af57349dcf58f5c71758f20664bdcc5f789b1d992df9924e48832324950210c44d6d9485fc1f92f99ada2d53aa5cd6386c4e9ef7053543844

    • SSDEEP

      24576:hUOWUMzMMgW1MWsuYl3MDLmYW9Kz4aDwnxruPHHk9EUxjCgAjH9aHfM2OuM3WQRa:hUfUmfgWTYl2xWs8vuPnkNxrIm3SBjN

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks