General
-
Target
afe3afba4de64464ecd3aa3c3a482e4f1e567da2527f15abf27cffbcc33d0eb9
-
Size
1.7MB
-
Sample
250223-xypffavlas
-
MD5
64c49410960aa724384ba077481ff847
-
SHA1
02aa8b260788f80b8c5a38ecd1658f8843065eee
-
SHA256
afe3afba4de64464ecd3aa3c3a482e4f1e567da2527f15abf27cffbcc33d0eb9
-
SHA512
696b244aaae93814ef0537dbb41d490b5da09c06f20151e1907d729110a5310899aefa6fbc986aa6ba5142f5e3cb807c44cc6768d07d3ba0acb7feb941aa822e
-
SSDEEP
49152:GTrS994ZJ9jn5xmEshhlI37C1zZ8dV9X:GfjZJ9jXqhhlILA
Static task
static1
Behavioral task
behavioral1
Sample
afe3afba4de64464ecd3aa3c3a482e4f1e567da2527f15abf27cffbcc33d0eb9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
afe3afba4de64464ecd3aa3c3a482e4f1e567da2527f15abf27cffbcc33d0eb9.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
afe3afba4de64464ecd3aa3c3a482e4f1e567da2527f15abf27cffbcc33d0eb9
-
Size
1.7MB
-
MD5
64c49410960aa724384ba077481ff847
-
SHA1
02aa8b260788f80b8c5a38ecd1658f8843065eee
-
SHA256
afe3afba4de64464ecd3aa3c3a482e4f1e567da2527f15abf27cffbcc33d0eb9
-
SHA512
696b244aaae93814ef0537dbb41d490b5da09c06f20151e1907d729110a5310899aefa6fbc986aa6ba5142f5e3cb807c44cc6768d07d3ba0acb7feb941aa822e
-
SSDEEP
49152:GTrS994ZJ9jn5xmEshhlI37C1zZ8dV9X:GfjZJ9jXqhhlILA
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-