General

  • Target

    random.exe

  • Size

    2.4MB

  • Sample

    250418-w5zpba1xay

  • MD5

    d7029dd4419d75aee694508dcabcb04a

  • SHA1

    5da6e9c4631231759ac63ddb6dc02b309dbb1330

  • SHA256

    7adb662ae774c1c002495dfe87145bb0161af78b494cc035ce57e22d79623ad8

  • SHA512

    b23c4ae0c7143b6f5c7a228a2a7451d29e4957e85e134ab758205d93ea428f833066652b1e366828d35e093e92f17b82aa207420ee47300eecbe407bdb7ef24a

  • SSDEEP

    49152:bdPGb2bpGjdECexFLCKytO8cNCqXFNZOviEqgwn85zoB:bdObqGjKBApbcNCVvLwYzE

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

suka

C2

45.93.20.28

Attributes
  • url_path

    /3d15e67552d448ff.php

rc4.plain

Targets

    • Target

      random.exe

    • Size

      2.4MB

    • MD5

      d7029dd4419d75aee694508dcabcb04a

    • SHA1

      5da6e9c4631231759ac63ddb6dc02b309dbb1330

    • SHA256

      7adb662ae774c1c002495dfe87145bb0161af78b494cc035ce57e22d79623ad8

    • SHA512

      b23c4ae0c7143b6f5c7a228a2a7451d29e4957e85e134ab758205d93ea428f833066652b1e366828d35e093e92f17b82aa207420ee47300eecbe407bdb7ef24a

    • SSDEEP

      49152:bdPGb2bpGjdECexFLCKytO8cNCqXFNZOviEqgwn85zoB:bdObqGjKBApbcNCVvLwYzE

    Score
    10/10
    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v16

Tasks