General
-
Target
random.exe
-
Size
1.7MB
-
Sample
250209-v84a8sxrcm
-
MD5
adb822a9a629882b5444563cf0b010df
-
SHA1
61a18bdd091861019b3ff17d121799696aac4510
-
SHA256
1314267a5983795475a4b0a8469890c111d961fa4f8cf3215125f324fc253924
-
SHA512
d31b575820ff095fe363a2b13905019216f317a1c883d724be9f576ea88dee2b10fa42aa39517c5f9a98633028f743c58d4199977ac90671535a87ca258dd73b
-
SSDEEP
24576:2kQzIcT6qOn1oYgttje1LkKTvtxECuu9sKM4bmdiHkbkR1dVh1rzTc7nxyi8xTqv:2krsn2+L6kiwCJM0mdiqkRrBiyiBl/
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
random.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral3
Sample
random.exe
Resource
win11-20250207-en
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
random.exe
-
Size
1.7MB
-
MD5
adb822a9a629882b5444563cf0b010df
-
SHA1
61a18bdd091861019b3ff17d121799696aac4510
-
SHA256
1314267a5983795475a4b0a8469890c111d961fa4f8cf3215125f324fc253924
-
SHA512
d31b575820ff095fe363a2b13905019216f317a1c883d724be9f576ea88dee2b10fa42aa39517c5f9a98633028f743c58d4199977ac90671535a87ca258dd73b
-
SSDEEP
24576:2kQzIcT6qOn1oYgttje1LkKTvtxECuu9sKM4bmdiHkbkR1dVh1rzTc7nxyi8xTqv:2krsn2+L6kiwCJM0mdiqkRrBiyiBl/
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-