General
-
Target
79f4d545d6842bd4211d75b2014a6cfe4ffbad232cac07bfa3f4e618f97b0c92
-
Size
1.7MB
-
Sample
250225-r8q45a1mt8
-
MD5
a7e9ec4dd973c27da2de717eb978c2f6
-
SHA1
d50d5bc80c8eaeadf4115c5080cf8fce50419963
-
SHA256
79f4d545d6842bd4211d75b2014a6cfe4ffbad232cac07bfa3f4e618f97b0c92
-
SHA512
618b9e5b84380f343edd2280a1b0fa9223b60b87c650b81c391099915d0c66f0bcfcfd90bf343cb190464bce17a46d42e2cc9265ba3a59e931f51b61b7e91d4c
-
SSDEEP
49152:eUx+v/lkFBpt2ycoaWL2v8C/IcaS6lxi7gQ7CC2:eg+v+pbay2vX776lxdC2
Static task
static1
Behavioral task
behavioral1
Sample
79f4d545d6842bd4211d75b2014a6cfe4ffbad232cac07bfa3f4e618f97b0c92.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79f4d545d6842bd4211d75b2014a6cfe4ffbad232cac07bfa3f4e618f97b0c92.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
79f4d545d6842bd4211d75b2014a6cfe4ffbad232cac07bfa3f4e618f97b0c92
-
Size
1.7MB
-
MD5
a7e9ec4dd973c27da2de717eb978c2f6
-
SHA1
d50d5bc80c8eaeadf4115c5080cf8fce50419963
-
SHA256
79f4d545d6842bd4211d75b2014a6cfe4ffbad232cac07bfa3f4e618f97b0c92
-
SHA512
618b9e5b84380f343edd2280a1b0fa9223b60b87c650b81c391099915d0c66f0bcfcfd90bf343cb190464bce17a46d42e2cc9265ba3a59e931f51b61b7e91d4c
-
SSDEEP
49152:eUx+v/lkFBpt2ycoaWL2v8C/IcaS6lxi7gQ7CC2:eg+v+pbay2vX776lxdC2
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-