General
-
Target
bc2ad4bc11e346aae07b7144035b2fc3acc32780d087247f93669fbd2c1db355.exe
-
Size
1.7MB
-
Sample
250216-advemasjas
-
MD5
42553e8d659ffebb70de6530c6773434
-
SHA1
aaf62fd335437f7dc04765c07c80707601af0ec5
-
SHA256
bc2ad4bc11e346aae07b7144035b2fc3acc32780d087247f93669fbd2c1db355
-
SHA512
7b6de9d8ac16adcf685d274b0f8fd2e0ad885bde8df603d41de4a3e375c7f18a97daf208804a8a42c6f5437da8d1477d6db65e7174d8a457cddffb843fd90b13
-
SSDEEP
24576:qJcCxMdhoJ1vXSHOQATmzFD0/JOYec9eNgW6RMe5ZjqUmg8GijZGMychsB6xe/cb:qbMd0JiuXA0/8cJjMejDjAVy07o/ces
Static task
static1
Behavioral task
behavioral1
Sample
bc2ad4bc11e346aae07b7144035b2fc3acc32780d087247f93669fbd2c1db355.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bc2ad4bc11e346aae07b7144035b2fc3acc32780d087247f93669fbd2c1db355.exe
Resource
win10v2004-20250211-en
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
bc2ad4bc11e346aae07b7144035b2fc3acc32780d087247f93669fbd2c1db355.exe
-
Size
1.7MB
-
MD5
42553e8d659ffebb70de6530c6773434
-
SHA1
aaf62fd335437f7dc04765c07c80707601af0ec5
-
SHA256
bc2ad4bc11e346aae07b7144035b2fc3acc32780d087247f93669fbd2c1db355
-
SHA512
7b6de9d8ac16adcf685d274b0f8fd2e0ad885bde8df603d41de4a3e375c7f18a97daf208804a8a42c6f5437da8d1477d6db65e7174d8a457cddffb843fd90b13
-
SSDEEP
24576:qJcCxMdhoJ1vXSHOQATmzFD0/JOYec9eNgW6RMe5ZjqUmg8GijZGMychsB6xe/cb:qbMd0JiuXA0/8cJjMejDjAVy07o/ces
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-