General
-
Target
931df5fb2fa246dd9b9199fbe01881c7436e583ba9d00b01efa65307a48a6573
-
Size
1.7MB
-
Sample
250220-p6grkaxlz3
-
MD5
d45d46d95218d83e0e5cb914f0a01354
-
SHA1
24cbb7c82476d687e88278ba1d36a8fb2046926b
-
SHA256
931df5fb2fa246dd9b9199fbe01881c7436e583ba9d00b01efa65307a48a6573
-
SHA512
8bd9e0760d654e340b2279addcede946e04155d6d7d24a89860b6dacd9471ad6f1452644f170c71703e7097707b94aa3e65a2787543e67efa6c0e999e99400a5
-
SSDEEP
49152:zNnUVo60NisRVY098Z/FzDA7q/Os6/SykithwBRuO:JngqiYSFFfA7XXTIRx
Static task
static1
Behavioral task
behavioral1
Sample
931df5fb2fa246dd9b9199fbe01881c7436e583ba9d00b01efa65307a48a6573.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
931df5fb2fa246dd9b9199fbe01881c7436e583ba9d00b01efa65307a48a6573.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
931df5fb2fa246dd9b9199fbe01881c7436e583ba9d00b01efa65307a48a6573
-
Size
1.7MB
-
MD5
d45d46d95218d83e0e5cb914f0a01354
-
SHA1
24cbb7c82476d687e88278ba1d36a8fb2046926b
-
SHA256
931df5fb2fa246dd9b9199fbe01881c7436e583ba9d00b01efa65307a48a6573
-
SHA512
8bd9e0760d654e340b2279addcede946e04155d6d7d24a89860b6dacd9471ad6f1452644f170c71703e7097707b94aa3e65a2787543e67efa6c0e999e99400a5
-
SSDEEP
49152:zNnUVo60NisRVY098Z/FzDA7q/Os6/SykithwBRuO:JngqiYSFFfA7XXTIRx
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-