General
-
Target
2815c00648e2dc6337b1328330d0e20b738d9ba8ce7d6e3180e3343f28bcc01a
-
Size
1.7MB
-
Sample
250206-l8ehfa1rdv
-
MD5
d378c5c6de1c909a071859c1eb820a79
-
SHA1
c5d60bd8933e0d030e7aa0e624c35a5ed336232f
-
SHA256
2815c00648e2dc6337b1328330d0e20b738d9ba8ce7d6e3180e3343f28bcc01a
-
SHA512
835c4212099d90bbff133e93d480c83b6ae9fcb3956382cdeb0fa20df9646602ac6d0305e12c71fc1ecda13d3ffa46ec81d089fc74fad835d268fa4c4b33ab4e
-
SSDEEP
49152:8+YDKsLR3e16m2V+ThqiGpF4WIq7QNbCTK:8+ui2VNiKFt7ybCTK
Static task
static1
Behavioral task
behavioral1
Sample
2815c00648e2dc6337b1328330d0e20b738d9ba8ce7d6e3180e3343f28bcc01a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2815c00648e2dc6337b1328330d0e20b738d9ba8ce7d6e3180e3343f28bcc01a.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
2815c00648e2dc6337b1328330d0e20b738d9ba8ce7d6e3180e3343f28bcc01a
-
Size
1.7MB
-
MD5
d378c5c6de1c909a071859c1eb820a79
-
SHA1
c5d60bd8933e0d030e7aa0e624c35a5ed336232f
-
SHA256
2815c00648e2dc6337b1328330d0e20b738d9ba8ce7d6e3180e3343f28bcc01a
-
SHA512
835c4212099d90bbff133e93d480c83b6ae9fcb3956382cdeb0fa20df9646602ac6d0305e12c71fc1ecda13d3ffa46ec81d089fc74fad835d268fa4c4b33ab4e
-
SSDEEP
49152:8+YDKsLR3e16m2V+ThqiGpF4WIq7QNbCTK:8+ui2VNiKFt7ybCTK
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-