General
-
Target
00b64a8f000a39d92c926d80c605708ff54f16b0da9a0ba001515e7fc185fb4b
-
Size
1.7MB
-
Sample
240901-nc2n7sygqm
-
MD5
9a60773af64dad81aae3d94abbe700ac
-
SHA1
ba78ba964bcb7bc437e266288175c25d97d13fcd
-
SHA256
00b64a8f000a39d92c926d80c605708ff54f16b0da9a0ba001515e7fc185fb4b
-
SHA512
bf9547b9713c06906e726db9d86e80251bc3f34727d8c6a0dc26ec5d89c6afbf535a2841802fc81f8fa38cfc316b21b47b6daca3edfd4fe62e159521921de1f9
-
SSDEEP
49152:YxN5RJiU1Z0EXRelOE0gU2ZXJl5HfNE/jN5DS:YxLbT1ZNXRelO6HJV6N5W
Static task
static1
Behavioral task
behavioral1
Sample
29c0837a12402c5c105fb2f2d3e31010b244c6ec0c437b3b7a977709f981d481.exe
Resource
win7-20240729-en
Malware Config
Extracted
stealc
leva
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
29c0837a12402c5c105fb2f2d3e31010b244c6ec0c437b3b7a977709f981d481.exe
-
Size
1.7MB
-
MD5
32fab6249908f4132bd4112d5d07c8f7
-
SHA1
6adafe56c06fde0cc3cb31ba02bb32f2a499fe83
-
SHA256
29c0837a12402c5c105fb2f2d3e31010b244c6ec0c437b3b7a977709f981d481
-
SHA512
f3e24f8d6c7dba0315a27de7503a0f269618caaceeaefbb3fbba742b8d36854386246de3aa024ee95a474db9d440a5cf77017b38d65b0977007c4c7740c15f33
-
SSDEEP
24576:elFsHdob8laggbUwdIXDa2cDMfrgx+ZJSzRmNprmzsnZkTdwktav8ZztYyHszbQY:2Fxq7hwwa2Nf8x+KzRarmzLdrEvLQNK
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-