General

  • Target

    fbf5d7d7d7fe3e0524593d57816fa386cbd3c4faa2cb629ae8e4d4712752b9cc

  • Size

    1.8MB

  • Sample

    250221-pan6rstkv5

  • MD5

    fb389a787e4ececf266bb4398bf09fad

  • SHA1

    a6648557e82802393e9eb4e953575e0869cb9cc9

  • SHA256

    fbf5d7d7d7fe3e0524593d57816fa386cbd3c4faa2cb629ae8e4d4712752b9cc

  • SHA512

    89f92da90df7942e2fbc9dc501de48a94fc89abbd5a2f3900e435e8eee510a6654733cbcec1a1e1520f3ab76a23eb09010afffabfb6d5c61b875d734d50b038c

  • SSDEEP

    49152:b5Jr5X0Qa5Dwc/E1Po0D9tQ7K+wZXUG2wkqQG0ejGz:bDlelwVQmvZkPwkcg

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      fbf5d7d7d7fe3e0524593d57816fa386cbd3c4faa2cb629ae8e4d4712752b9cc

    • Size

      1.8MB

    • MD5

      fb389a787e4ececf266bb4398bf09fad

    • SHA1

      a6648557e82802393e9eb4e953575e0869cb9cc9

    • SHA256

      fbf5d7d7d7fe3e0524593d57816fa386cbd3c4faa2cb629ae8e4d4712752b9cc

    • SHA512

      89f92da90df7942e2fbc9dc501de48a94fc89abbd5a2f3900e435e8eee510a6654733cbcec1a1e1520f3ab76a23eb09010afffabfb6d5c61b875d734d50b038c

    • SSDEEP

      49152:b5Jr5X0Qa5Dwc/E1Po0D9tQ7K+wZXUG2wkqQG0ejGz:bDlelwVQmvZkPwkcg

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks