General

  • Target

    163b29501deb75a5b130237c592b36ffe896ba69fe58f67607a081d06b0e858b

  • Size

    1.7MB

  • Sample

    250220-q8cfaswpcj

  • MD5

    4c43632a7295941507a54634f2e08c0c

  • SHA1

    ecf01d4365fcfbb8132d2f52386d418f33e0885f

  • SHA256

    163b29501deb75a5b130237c592b36ffe896ba69fe58f67607a081d06b0e858b

  • SHA512

    257e2473d4f325fa3f273dab903878c8287359a7c9091cb15f3cfe5f9dc3a6c6e34594129460e61bb13b10cc19d44b355b67555032caa884e37334e16c7c5c72

  • SSDEEP

    49152:138hK1TuRs1UQyGrm5Je/8JPlPCpB8FoXYFAN:1aKPUQfyTlafkdFAN

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      163b29501deb75a5b130237c592b36ffe896ba69fe58f67607a081d06b0e858b

    • Size

      1.7MB

    • MD5

      4c43632a7295941507a54634f2e08c0c

    • SHA1

      ecf01d4365fcfbb8132d2f52386d418f33e0885f

    • SHA256

      163b29501deb75a5b130237c592b36ffe896ba69fe58f67607a081d06b0e858b

    • SHA512

      257e2473d4f325fa3f273dab903878c8287359a7c9091cb15f3cfe5f9dc3a6c6e34594129460e61bb13b10cc19d44b355b67555032caa884e37334e16c7c5c72

    • SSDEEP

      49152:138hK1TuRs1UQyGrm5Je/8JPlPCpB8FoXYFAN:1aKPUQfyTlafkdFAN

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks