General
-
Target
7182c9ebd0b63ecca32ddca0918125ba97ba67cc393297a269d1a4be87dabf9b.exe
-
Size
1.8MB
-
Sample
240928-bvz7wazcrk
-
MD5
8e9e399810d55581ea8a384018d4a7f1
-
SHA1
d5b617fa2991a0d26ab245e0fe0bccb90fd8fe2e
-
SHA256
7182c9ebd0b63ecca32ddca0918125ba97ba67cc393297a269d1a4be87dabf9b
-
SHA512
cea3d0e8cc0bbc5939c7f95b344d0477f573069a4e0987d624dd7fa124a897145cf76ab6b5eea042f0e5e84c0fd9de9b802f3599a79a45dd2ddf402a537c8d65
-
SSDEEP
49152:2LG9AfmXzxYny4i2IH7wxOjDnNNZO5ZOs2WkZ4V:2LG9imi7ivbxjqtom
Static task
static1
Behavioral task
behavioral1
Sample
7182c9ebd0b63ecca32ddca0918125ba97ba67cc393297a269d1a4be87dabf9b.exe
Resource
win7-20240708-en
Malware Config
Extracted
stealc
save
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
7182c9ebd0b63ecca32ddca0918125ba97ba67cc393297a269d1a4be87dabf9b.exe
-
Size
1.8MB
-
MD5
8e9e399810d55581ea8a384018d4a7f1
-
SHA1
d5b617fa2991a0d26ab245e0fe0bccb90fd8fe2e
-
SHA256
7182c9ebd0b63ecca32ddca0918125ba97ba67cc393297a269d1a4be87dabf9b
-
SHA512
cea3d0e8cc0bbc5939c7f95b344d0477f573069a4e0987d624dd7fa124a897145cf76ab6b5eea042f0e5e84c0fd9de9b802f3599a79a45dd2ddf402a537c8d65
-
SSDEEP
49152:2LG9AfmXzxYny4i2IH7wxOjDnNNZO5ZOs2WkZ4V:2LG9imi7ivbxjqtom
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-