General

  • Target

    66ef253d873fe7b0ec0819e227ad414ba790323cf22768e1d77b8bbb60b5763d

  • Size

    1.7MB

  • Sample

    250224-pyz8yasrt2

  • MD5

    1c9d2ce02cf2db4e31c233b989e19481

  • SHA1

    27288ea0eed37f5bfc90821579adc3d43bde44bd

  • SHA256

    66ef253d873fe7b0ec0819e227ad414ba790323cf22768e1d77b8bbb60b5763d

  • SHA512

    925562d14ab4cc118ffd66ff0532409b3970c4b7de84bdc9c59a32872c4628f530e696a422e67f8d4a7d9c6232ad0e5cef8b2cf07be464d4373aa2ddee02b58c

  • SSDEEP

    24576:I2+fxEtozb6GS9f1z9m9ag3RX++lv6+rNA6lBNkPFRRCjviiTxLsFX1R/8OBO2v:EEtHGo1ZmRlvle6lBeWiQe7O

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      66ef253d873fe7b0ec0819e227ad414ba790323cf22768e1d77b8bbb60b5763d

    • Size

      1.7MB

    • MD5

      1c9d2ce02cf2db4e31c233b989e19481

    • SHA1

      27288ea0eed37f5bfc90821579adc3d43bde44bd

    • SHA256

      66ef253d873fe7b0ec0819e227ad414ba790323cf22768e1d77b8bbb60b5763d

    • SHA512

      925562d14ab4cc118ffd66ff0532409b3970c4b7de84bdc9c59a32872c4628f530e696a422e67f8d4a7d9c6232ad0e5cef8b2cf07be464d4373aa2ddee02b58c

    • SSDEEP

      24576:I2+fxEtozb6GS9f1z9m9ag3RX++lv6+rNA6lBNkPFRRCjviiTxLsFX1R/8OBO2v:EEtHGo1ZmRlvle6lBeWiQe7O

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks