General

  • Target

    random.exe

  • Size

    2.4MB

  • Sample

    250418-h3fa1aymv2

  • MD5

    0b2ebca8bff1e5cd9e43cfabc020a8c5

  • SHA1

    1f3a7b367dac875bb12f5cd5165e66f70faf5488

  • SHA256

    04ff626ceab63a9ebabda3df54dff36e36c44585df115f5b43e5802367689e49

  • SHA512

    1d794bd43cfdb88b2dd2d872a572882f75e802eee9aaaa034ccfd276bfdfe448bd4130caa744a80ef0ad8e1a2a8ea13004419aaa6eaa60a6c54722e22528753d

  • SSDEEP

    49152:PQmG4cn3UY/iWDO9fEaBlWwqP2/dyK3dBmyN1HKbl:4qc3UY/iGO9fEaTRE2Fx3dBmy3

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

suka

C2

45.93.20.28

Attributes
  • url_path

    /3d15e67552d448ff.php

rc4.plain

Targets

    • Target

      random.exe

    • Size

      2.4MB

    • MD5

      0b2ebca8bff1e5cd9e43cfabc020a8c5

    • SHA1

      1f3a7b367dac875bb12f5cd5165e66f70faf5488

    • SHA256

      04ff626ceab63a9ebabda3df54dff36e36c44585df115f5b43e5802367689e49

    • SHA512

      1d794bd43cfdb88b2dd2d872a572882f75e802eee9aaaa034ccfd276bfdfe448bd4130caa744a80ef0ad8e1a2a8ea13004419aaa6eaa60a6c54722e22528753d

    • SSDEEP

      49152:PQmG4cn3UY/iWDO9fEaBlWwqP2/dyK3dBmyN1HKbl:4qc3UY/iGO9fEaTRE2Fx3dBmy3

    Score
    10/10
    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v16

Tasks