General
-
Target
7af1ac95d468a1b0d9dfb2dbe0dba8b3aca9a09e2620a0ec35dc087f829f9401.exe
-
Size
1.7MB
-
Sample
240906-bt1f9ayhmd
-
MD5
1777e41c01138cfcd1b8e4b6082ae3b1
-
SHA1
bf83c19106c0226d8e3e08fbbd5633ce96472bf0
-
SHA256
7af1ac95d468a1b0d9dfb2dbe0dba8b3aca9a09e2620a0ec35dc087f829f9401
-
SHA512
e44f8d2b9c5f33b48c64107b9a1c8fd0ac77bf88b465e6fcdbcc2b1b3253f71922b350048e55b6d97e938892084b0d7cc098cdd208ee1f15b9434426449fa88b
-
SSDEEP
49152:V7W9uuFKbA8/VUtFlVMFCZVjyizEDOztVefhGMxSSY:TiKbd9UBVMy2izYO8
Static task
static1
Behavioral task
behavioral1
Sample
7af1ac95d468a1b0d9dfb2dbe0dba8b3aca9a09e2620a0ec35dc087f829f9401.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
leva
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
7af1ac95d468a1b0d9dfb2dbe0dba8b3aca9a09e2620a0ec35dc087f829f9401.exe
-
Size
1.7MB
-
MD5
1777e41c01138cfcd1b8e4b6082ae3b1
-
SHA1
bf83c19106c0226d8e3e08fbbd5633ce96472bf0
-
SHA256
7af1ac95d468a1b0d9dfb2dbe0dba8b3aca9a09e2620a0ec35dc087f829f9401
-
SHA512
e44f8d2b9c5f33b48c64107b9a1c8fd0ac77bf88b465e6fcdbcc2b1b3253f71922b350048e55b6d97e938892084b0d7cc098cdd208ee1f15b9434426449fa88b
-
SSDEEP
49152:V7W9uuFKbA8/VUtFlVMFCZVjyizEDOztVefhGMxSSY:TiKbd9UBVMy2izYO8
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-