Resubmissions

24/02/2025, 13:54

250224-q7l84swjy6 10

24/02/2025, 13:51

250224-q5tv6svrz4 10

General

  • Target

    4206305ba328a78ebf2294d9460a0ead5fcff8531e345af8a96d9aacf88fbb3f

  • Size

    1.7MB

  • Sample

    250224-q5tv6svrz4

  • MD5

    a03cb3acc4ec78a0997c7a22e3dbc851

  • SHA1

    84fcc3160f91bdb34267a6f5188a4eda7704f436

  • SHA256

    4206305ba328a78ebf2294d9460a0ead5fcff8531e345af8a96d9aacf88fbb3f

  • SHA512

    ec81dd9df2e91d82cf35ab16f7df9b86d690849937b9ddb5a32fa659051d9b040084d42baf0e9a83bfd96dc75f1b3c40a59b79460b3271d07f0030e19b1eab72

  • SSDEEP

    24576:DYWwlmG38/vVRihsl8sbdbZPe2Ufzwk6hgDXhhF0KM5y650GcDrwhmizVaPN9eya:DdRVRr8AbZpUfwmBOV501MRUFE

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      4206305ba328a78ebf2294d9460a0ead5fcff8531e345af8a96d9aacf88fbb3f

    • Size

      1.7MB

    • MD5

      a03cb3acc4ec78a0997c7a22e3dbc851

    • SHA1

      84fcc3160f91bdb34267a6f5188a4eda7704f436

    • SHA256

      4206305ba328a78ebf2294d9460a0ead5fcff8531e345af8a96d9aacf88fbb3f

    • SHA512

      ec81dd9df2e91d82cf35ab16f7df9b86d690849937b9ddb5a32fa659051d9b040084d42baf0e9a83bfd96dc75f1b3c40a59b79460b3271d07f0030e19b1eab72

    • SSDEEP

      24576:DYWwlmG38/vVRihsl8sbdbZPe2Ufzwk6hgDXhhF0KM5y650GcDrwhmizVaPN9eya:DdRVRr8AbZpUfwmBOV501MRUFE

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks