General

  • Target

    8ecaabd27752d56a8434edab048423eeef189823adaf434776d77a2063d4c9ca

  • Size

    1.7MB

  • Sample

    250225-svjcssspy9

  • MD5

    ffe48e48b46fe2386f7e7911ede88425

  • SHA1

    84f01d0b1405ab0c665bcdfe64a059113b1ac4bd

  • SHA256

    8ecaabd27752d56a8434edab048423eeef189823adaf434776d77a2063d4c9ca

  • SHA512

    8259fc021182a34c043acc6b28f2da6a487bdfd5b66538321c99e12dec6d2753226367f16016bfe77cab4548df5210841aebba2efbbf0eb57d386d3b16992af1

  • SSDEEP

    49152:t49i/KXr2d6JKs1RxAqmiED/qI7nwVZKux:G9iCXr22KQ+/zwznx

Malware Config

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Targets

    • Target

      8ecaabd27752d56a8434edab048423eeef189823adaf434776d77a2063d4c9ca

    • Size

      1.7MB

    • MD5

      ffe48e48b46fe2386f7e7911ede88425

    • SHA1

      84f01d0b1405ab0c665bcdfe64a059113b1ac4bd

    • SHA256

      8ecaabd27752d56a8434edab048423eeef189823adaf434776d77a2063d4c9ca

    • SHA512

      8259fc021182a34c043acc6b28f2da6a487bdfd5b66538321c99e12dec6d2753226367f16016bfe77cab4548df5210841aebba2efbbf0eb57d386d3b16992af1

    • SSDEEP

      49152:t49i/KXr2d6JKs1RxAqmiED/qI7nwVZKux:G9iCXr22KQ+/zwznx

    • Stealc

      Stealc is an infostealer written in C++.

    • Stealc family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks