General

  • Target

    bc2ad4bc11e346aae07b7144035b2fc3acc32780d087247f93669fbd2c1db355.exe

  • Size

    1.7MB

  • Sample

    250216-advemasjas

  • MD5

    42553e8d659ffebb70de6530c6773434

  • SHA1

    aaf62fd335437f7dc04765c07c80707601af0ec5

  • SHA256

    bc2ad4bc11e346aae07b7144035b2fc3acc32780d087247f93669fbd2c1db355

  • SHA512

    7b6de9d8ac16adcf685d274b0f8fd2e0ad885bde8df603d41de4a3e375c7f18a97daf208804a8a42c6f5437da8d1477d6db65e7174d8a457cddffb843fd90b13

  • SSDEEP

    24576:qJcCxMdhoJ1vXSHOQATmzFD0/JOYec9eNgW6RMe5ZjqUmg8GijZGMychsB6xe/cb:qbMd0JiuXA0/8cJjMejDjAVy07o/ces

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      bc2ad4bc11e346aae07b7144035b2fc3acc32780d087247f93669fbd2c1db355.exe

    • Size

      1.7MB

    • MD5

      42553e8d659ffebb70de6530c6773434

    • SHA1

      aaf62fd335437f7dc04765c07c80707601af0ec5

    • SHA256

      bc2ad4bc11e346aae07b7144035b2fc3acc32780d087247f93669fbd2c1db355

    • SHA512

      7b6de9d8ac16adcf685d274b0f8fd2e0ad885bde8df603d41de4a3e375c7f18a97daf208804a8a42c6f5437da8d1477d6db65e7174d8a457cddffb843fd90b13

    • SSDEEP

      24576:qJcCxMdhoJ1vXSHOQATmzFD0/JOYec9eNgW6RMe5ZjqUmg8GijZGMychsB6xe/cb:qbMd0JiuXA0/8cJjMejDjAVy07o/ces

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks