General

  • Target

    afe3afba4de64464ecd3aa3c3a482e4f1e567da2527f15abf27cffbcc33d0eb9

  • Size

    1.7MB

  • Sample

    250223-xpql5swnw2

  • MD5

    64c49410960aa724384ba077481ff847

  • SHA1

    02aa8b260788f80b8c5a38ecd1658f8843065eee

  • SHA256

    afe3afba4de64464ecd3aa3c3a482e4f1e567da2527f15abf27cffbcc33d0eb9

  • SHA512

    696b244aaae93814ef0537dbb41d490b5da09c06f20151e1907d729110a5310899aefa6fbc986aa6ba5142f5e3cb807c44cc6768d07d3ba0acb7feb941aa822e

  • SSDEEP

    49152:GTrS994ZJ9jn5xmEshhlI37C1zZ8dV9X:GfjZJ9jXqhhlILA

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      afe3afba4de64464ecd3aa3c3a482e4f1e567da2527f15abf27cffbcc33d0eb9

    • Size

      1.7MB

    • MD5

      64c49410960aa724384ba077481ff847

    • SHA1

      02aa8b260788f80b8c5a38ecd1658f8843065eee

    • SHA256

      afe3afba4de64464ecd3aa3c3a482e4f1e567da2527f15abf27cffbcc33d0eb9

    • SHA512

      696b244aaae93814ef0537dbb41d490b5da09c06f20151e1907d729110a5310899aefa6fbc986aa6ba5142f5e3cb807c44cc6768d07d3ba0acb7feb941aa822e

    • SSDEEP

      49152:GTrS994ZJ9jn5xmEshhlI37C1zZ8dV9X:GfjZJ9jXqhhlILA

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks