General
-
Target
2141d9159c4fca891bba493acba71c5973b9d554e4b0552f4a87be7f3bcd112e
-
Size
1.7MB
-
Sample
240823-nbtbfa1aja
-
MD5
952471642155df63bf9dd4bbd2828c45
-
SHA1
7de09af139988b2712b7922220a68940ca6379b5
-
SHA256
2141d9159c4fca891bba493acba71c5973b9d554e4b0552f4a87be7f3bcd112e
-
SHA512
04debdb0c9a6761e0132e78536073c250b4d4b2d1be1e1761c6d2e388713b84dfaa80adc984de548bb42ce2156500d650081c4084b28f03b316ac7a18d996a5a
-
SSDEEP
49152:uCwQ7K+cKolGbhsL0uTvllCef+9/6nZgRRq9eHN6:2QFLdQllY6n2qkHN
Static task
static1
Behavioral task
behavioral1
Sample
2141d9159c4fca891bba493acba71c5973b9d554e4b0552f4a87be7f3bcd112e.exe
Resource
win7-20240704-en
Malware Config
Extracted
stealc
nord
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
2141d9159c4fca891bba493acba71c5973b9d554e4b0552f4a87be7f3bcd112e
-
Size
1.7MB
-
MD5
952471642155df63bf9dd4bbd2828c45
-
SHA1
7de09af139988b2712b7922220a68940ca6379b5
-
SHA256
2141d9159c4fca891bba493acba71c5973b9d554e4b0552f4a87be7f3bcd112e
-
SHA512
04debdb0c9a6761e0132e78536073c250b4d4b2d1be1e1761c6d2e388713b84dfaa80adc984de548bb42ce2156500d650081c4084b28f03b316ac7a18d996a5a
-
SSDEEP
49152:uCwQ7K+cKolGbhsL0uTvllCef+9/6nZgRRq9eHN6:2QFLdQllY6n2qkHN
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-