General
-
Target
bfc9339f72ae908de10bc286d9637cd10ddf1825d61ceab9227d6bb1fa8f7a16
-
Size
1.7MB
-
Sample
250224-pkjzsssks5
-
MD5
2903eabbe464fc03cccfadffe4212b50
-
SHA1
160952e5647602c246d2d4a994a2969a9b975224
-
SHA256
bfc9339f72ae908de10bc286d9637cd10ddf1825d61ceab9227d6bb1fa8f7a16
-
SHA512
59831d0e57c6991edc7d4174c617034099f435a0063975ec7a8dc84a97da9fb0269d227f207190046b3e4126988777f5e15179c851e2942de0298bd9623b8e8e
-
SSDEEP
49152:NGxSEAN3wxbWG8n1O9p7+w/+ybowuAeT:NZ8R8QP+w/TBe
Static task
static1
Behavioral task
behavioral1
Sample
bfc9339f72ae908de10bc286d9637cd10ddf1825d61ceab9227d6bb1fa8f7a16.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
bfc9339f72ae908de10bc286d9637cd10ddf1825d61ceab9227d6bb1fa8f7a16.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
bfc9339f72ae908de10bc286d9637cd10ddf1825d61ceab9227d6bb1fa8f7a16
-
Size
1.7MB
-
MD5
2903eabbe464fc03cccfadffe4212b50
-
SHA1
160952e5647602c246d2d4a994a2969a9b975224
-
SHA256
bfc9339f72ae908de10bc286d9637cd10ddf1825d61ceab9227d6bb1fa8f7a16
-
SHA512
59831d0e57c6991edc7d4174c617034099f435a0063975ec7a8dc84a97da9fb0269d227f207190046b3e4126988777f5e15179c851e2942de0298bd9623b8e8e
-
SSDEEP
49152:NGxSEAN3wxbWG8n1O9p7+w/+ybowuAeT:NZ8R8QP+w/TBe
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-