General
-
Target
747c903a9c783a32613d454bc73e8911525fe3b3f0c72b138458ab7f9fbe1cb1.exe
-
Size
1.8MB
-
Sample
240927-btbg5ayajr
-
MD5
7f275c6abf9ee064febb9736bfb047f2
-
SHA1
5c93982f849358223f1472caf1ed8f2061a66616
-
SHA256
747c903a9c783a32613d454bc73e8911525fe3b3f0c72b138458ab7f9fbe1cb1
-
SHA512
cda88ba64f11c67d372a9398eb949fc328e48551fa4b48d2095bd32c86daed1c18f1aea6817e9bd4ad887e7c5c87cffcda5de66aed33da95c0e238a78794f53f
-
SSDEEP
49152:ckVAooLtdIs2ioLW/NrC5lvRQ0lukTFe:X2ooBJC5lfy
Static task
static1
Behavioral task
behavioral1
Sample
747c903a9c783a32613d454bc73e8911525fe3b3f0c72b138458ab7f9fbe1cb1.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
save
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
747c903a9c783a32613d454bc73e8911525fe3b3f0c72b138458ab7f9fbe1cb1.exe
-
Size
1.8MB
-
MD5
7f275c6abf9ee064febb9736bfb047f2
-
SHA1
5c93982f849358223f1472caf1ed8f2061a66616
-
SHA256
747c903a9c783a32613d454bc73e8911525fe3b3f0c72b138458ab7f9fbe1cb1
-
SHA512
cda88ba64f11c67d372a9398eb949fc328e48551fa4b48d2095bd32c86daed1c18f1aea6817e9bd4ad887e7c5c87cffcda5de66aed33da95c0e238a78794f53f
-
SSDEEP
49152:ckVAooLtdIs2ioLW/NrC5lvRQ0lukTFe:X2ooBJC5lfy
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-