General
-
Target
c3aeec8fdf17cb7d30e2d97dce245505d26b90e160856e90f9e7fb8949a01022
-
Size
1.7MB
-
Sample
240912-2ps5gsyhlr
-
MD5
40cb7abb3661d5c0bbee8c794bc8fd01
-
SHA1
413785114a79f6ce35a5ea35af89b40e4a70b280
-
SHA256
c3aeec8fdf17cb7d30e2d97dce245505d26b90e160856e90f9e7fb8949a01022
-
SHA512
ab95e13bcf49385789b46387ee10b28e726c58bc7093edf17364789d74934224a9fbe4e72334a7b8be36d89fa9f378e4dd491c380b0f8696c835caa3316f0806
-
SSDEEP
24576:Rh1hlH4vRteq8529WxH0yk19k16XAkFkvt6clXMcIlaGvgGclGdRHwsN5yaRIdyg:7FHieq8MWws6eMcC7vXmGdRHb5Ady
Static task
static1
Behavioral task
behavioral1
Sample
c3aeec8fdf17cb7d30e2d97dce245505d26b90e160856e90f9e7fb8949a01022.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
leva
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
c3aeec8fdf17cb7d30e2d97dce245505d26b90e160856e90f9e7fb8949a01022
-
Size
1.7MB
-
MD5
40cb7abb3661d5c0bbee8c794bc8fd01
-
SHA1
413785114a79f6ce35a5ea35af89b40e4a70b280
-
SHA256
c3aeec8fdf17cb7d30e2d97dce245505d26b90e160856e90f9e7fb8949a01022
-
SHA512
ab95e13bcf49385789b46387ee10b28e726c58bc7093edf17364789d74934224a9fbe4e72334a7b8be36d89fa9f378e4dd491c380b0f8696c835caa3316f0806
-
SSDEEP
24576:Rh1hlH4vRteq8529WxH0yk19k16XAkFkvt6clXMcIlaGvgGclGdRHwsN5yaRIdyg:7FHieq8MWws6eMcC7vXmGdRHb5Ady
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-