General
-
Target
66ad706bf6d8fd7f00f3ec06d9d421e30c1855105c94d2320e25b3dfce98d7c4
-
Size
1.7MB
-
Sample
250220-qpbdwsxpv3
-
MD5
e6cd645a221c12039a9365722fa6430d
-
SHA1
f711762e81f7d04e1e7bb258cef4443b0048b084
-
SHA256
66ad706bf6d8fd7f00f3ec06d9d421e30c1855105c94d2320e25b3dfce98d7c4
-
SHA512
dafb580fc7e88314e80f3bff3df540def474d889170b9b6a6449c1c1969dba0371434d8e933d3ee2c17587413eb03127a6fe01a96fdb8ecfc36b21d45e82342f
-
SSDEEP
49152:66pp7NvzxvdRvwe5VoJPtBCfXzez+8V2:6kdlXvEJPtw6z+8V
Static task
static1
Behavioral task
behavioral1
Sample
66ad706bf6d8fd7f00f3ec06d9d421e30c1855105c94d2320e25b3dfce98d7c4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
66ad706bf6d8fd7f00f3ec06d9d421e30c1855105c94d2320e25b3dfce98d7c4.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
66ad706bf6d8fd7f00f3ec06d9d421e30c1855105c94d2320e25b3dfce98d7c4
-
Size
1.7MB
-
MD5
e6cd645a221c12039a9365722fa6430d
-
SHA1
f711762e81f7d04e1e7bb258cef4443b0048b084
-
SHA256
66ad706bf6d8fd7f00f3ec06d9d421e30c1855105c94d2320e25b3dfce98d7c4
-
SHA512
dafb580fc7e88314e80f3bff3df540def474d889170b9b6a6449c1c1969dba0371434d8e933d3ee2c17587413eb03127a6fe01a96fdb8ecfc36b21d45e82342f
-
SSDEEP
49152:66pp7NvzxvdRvwe5VoJPtBCfXzez+8V2:6kdlXvEJPtw6z+8V
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-