General
-
Target
12f5f85d6086d0e091646fb6fcc696fd55d94a00fe41c469a219fb111a1da3b9
-
Size
1.7MB
-
Sample
250206-mqdnvstrhp
-
MD5
77702a2d9700f6a95f4d5d07031bb3c5
-
SHA1
6c08c713e5f13fbdfa60402269ebb96a6de8b73f
-
SHA256
12f5f85d6086d0e091646fb6fcc696fd55d94a00fe41c469a219fb111a1da3b9
-
SHA512
afb73eba6c60dcfbe45a4fb57fa08a398510b1982090511de228c5b7231fa81384506091551de98404b8ac30d5a5f4669d8cf08c626ffcaed20cb4cbe3467949
-
SSDEEP
49152:KN5aoV9cZpK4EXhSbbecYJnhAEHs7uwSmIY/VYR:KraKCpK4EXhSb6cGMSwSXM
Static task
static1
Behavioral task
behavioral1
Sample
12f5f85d6086d0e091646fb6fcc696fd55d94a00fe41c469a219fb111a1da3b9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12f5f85d6086d0e091646fb6fcc696fd55d94a00fe41c469a219fb111a1da3b9.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
12f5f85d6086d0e091646fb6fcc696fd55d94a00fe41c469a219fb111a1da3b9
-
Size
1.7MB
-
MD5
77702a2d9700f6a95f4d5d07031bb3c5
-
SHA1
6c08c713e5f13fbdfa60402269ebb96a6de8b73f
-
SHA256
12f5f85d6086d0e091646fb6fcc696fd55d94a00fe41c469a219fb111a1da3b9
-
SHA512
afb73eba6c60dcfbe45a4fb57fa08a398510b1982090511de228c5b7231fa81384506091551de98404b8ac30d5a5f4669d8cf08c626ffcaed20cb4cbe3467949
-
SSDEEP
49152:KN5aoV9cZpK4EXhSbbecYJnhAEHs7uwSmIY/VYR:KraKCpK4EXhSb6cGMSwSXM
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-