General

  • Target

    random.exe

  • Size

    2.5MB

  • Sample

    250418-w51xdavj17

  • MD5

    693a6b17e7d30c71c0b8d9e571d1ceca

  • SHA1

    f3e789872b4b1d5b9028fe91d342d3de230ceccc

  • SHA256

    9a0fa3492b90b433064801547c706381bfcdb54995d8bd62731e76d82ecef64d

  • SHA512

    b80f21db4aff8b097bfb860508ff556aedefe52b9df93d49ebb609f8f0afb0947580f6287b15dd617085aa8292f4110aedaa7cc62f18d0503effc9e39563e39c

  • SSDEEP

    49152:IdBHsVwj/BYIdq+Aw7mv7sM4ub0ELLArv7IXluxcpIP9znnL7:cuVm/BYB+QD4fSkv72Kuo9znnL7

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

suka

C2

45.93.20.28

Attributes
  • url_path

    /3d15e67552d448ff.php

rc4.plain

Targets

    • Target

      random.exe

    • Size

      2.5MB

    • MD5

      693a6b17e7d30c71c0b8d9e571d1ceca

    • SHA1

      f3e789872b4b1d5b9028fe91d342d3de230ceccc

    • SHA256

      9a0fa3492b90b433064801547c706381bfcdb54995d8bd62731e76d82ecef64d

    • SHA512

      b80f21db4aff8b097bfb860508ff556aedefe52b9df93d49ebb609f8f0afb0947580f6287b15dd617085aa8292f4110aedaa7cc62f18d0503effc9e39563e39c

    • SSDEEP

      49152:IdBHsVwj/BYIdq+Aw7mv7sM4ub0ELLArv7IXluxcpIP9znnL7:cuVm/BYB+QD4fSkv72Kuo9znnL7

    Score
    10/10
    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v16

Tasks