General
-
Target
0c0de283d3c6871b2ec8c9f511017f301294885e33841ff6fe753f47511417d3
-
Size
1.7MB
-
Sample
250219-clwnrswpv2
-
MD5
8b6980e83eb616053aeff6fe2a3c6224
-
SHA1
f0090a30e164da4ccad453e40980ec639ae0f1da
-
SHA256
0c0de283d3c6871b2ec8c9f511017f301294885e33841ff6fe753f47511417d3
-
SHA512
afe8d516df200461804d8333e0c29e2cac5628b095f3f3c264820e8990f25be067885c4aefaba8a7b84dfa92f1c7802b3cc05528c7e3b4e4402555299676d02f
-
SSDEEP
49152:RVKm80LEVntwx9Ddb5CMZJ0w8NwXwI/fcuD/:3hEzi95lCMZ/9cg
Static task
static1
Behavioral task
behavioral1
Sample
0c0de283d3c6871b2ec8c9f511017f301294885e33841ff6fe753f47511417d3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c0de283d3c6871b2ec8c9f511017f301294885e33841ff6fe753f47511417d3.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
0c0de283d3c6871b2ec8c9f511017f301294885e33841ff6fe753f47511417d3
-
Size
1.7MB
-
MD5
8b6980e83eb616053aeff6fe2a3c6224
-
SHA1
f0090a30e164da4ccad453e40980ec639ae0f1da
-
SHA256
0c0de283d3c6871b2ec8c9f511017f301294885e33841ff6fe753f47511417d3
-
SHA512
afe8d516df200461804d8333e0c29e2cac5628b095f3f3c264820e8990f25be067885c4aefaba8a7b84dfa92f1c7802b3cc05528c7e3b4e4402555299676d02f
-
SSDEEP
49152:RVKm80LEVntwx9Ddb5CMZJ0w8NwXwI/fcuD/:3hEzi95lCMZ/9cg
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4