Resubmissions

17/04/2025, 18:05

250417-wpbbsazjv8 10

05/04/2025, 13:14

250405-qg3s6szlx9 7

General

  • Target

    random.exe

  • Size

    2.4MB

  • Sample

    250417-wpbbsazjv8

  • MD5

    bb7efd4c8ea07b91728e2a27cc8cf6f4

  • SHA1

    9b5470ff21be58857d85e87d4174647e0ceb10fd

  • SHA256

    e205646761f59f23d5c8a8483f8a03a313d3b435b302d3a37061840b5cc084c3

  • SHA512

    b3c51e8ffb4b98a21f1d7c446d6b46914333cfe2b003e8f04feccc9267194e6dc83086c5c580a796012f237abdb63c0e7bbd99433cd60edc1dc2bbbf712f472c

  • SSDEEP

    49152:AKn1C36HXns3gNFs4MYJaZpE60nYHPJbE/JEsvwlbX7j80MUpn0B:nXnXFs4M4Ihb0Ksvwl3803n0

Malware Config

Extracted

Family

stealc

Botnet

suka

C2

45.93.20.28

Attributes
  • url_path

    /3d15e67552d448ff.php

rc4.plain

Targets

    • Target

      random.exe

    • Size

      2.4MB

    • MD5

      bb7efd4c8ea07b91728e2a27cc8cf6f4

    • SHA1

      9b5470ff21be58857d85e87d4174647e0ceb10fd

    • SHA256

      e205646761f59f23d5c8a8483f8a03a313d3b435b302d3a37061840b5cc084c3

    • SHA512

      b3c51e8ffb4b98a21f1d7c446d6b46914333cfe2b003e8f04feccc9267194e6dc83086c5c580a796012f237abdb63c0e7bbd99433cd60edc1dc2bbbf712f472c

    • SSDEEP

      49152:AKn1C36HXns3gNFs4MYJaZpE60nYHPJbE/JEsvwlbX7j80MUpn0B:nXnXFs4M4Ihb0Ksvwl3803n0

    • Detects TriumphLoader

      Detects TriumphLoader.

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • TriumphLoader

      TriumphLoader is a c++ loader based on the open source AbsentLoader.

    • Triumphloader family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v16

Tasks