General
-
Target
file.exe
-
Size
1.7MB
-
Sample
241001-n4kvrssbnh
-
MD5
52d694dd9ca47e7653dafb7d4e3914a4
-
SHA1
d56885a0f102b7d9412e45cbdb72e0ba555e14bc
-
SHA256
034aa9eb37f9417eb9b230ab580dea8477a9b2c9c5266d686fcc0ab8e0130963
-
SHA512
0bb000df2e6899c48daefb3d3008a59ccecfb515473bc778f73f44c43b993451b0fe9ab2f4e25e53fc2824e660ef64983bffb28540a84acff1f1405f9fcf9e71
-
SSDEEP
24576:xt5/YykdxNliRCDLYyONm2D9BvbIm1PTg80uGnrwzGdX1R7mV8pvlBPu2VKIhuMn:jNkyRyL2vxTgBR7eQlVu+lgtl/P
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
file.exe
-
Size
1.7MB
-
MD5
52d694dd9ca47e7653dafb7d4e3914a4
-
SHA1
d56885a0f102b7d9412e45cbdb72e0ba555e14bc
-
SHA256
034aa9eb37f9417eb9b230ab580dea8477a9b2c9c5266d686fcc0ab8e0130963
-
SHA512
0bb000df2e6899c48daefb3d3008a59ccecfb515473bc778f73f44c43b993451b0fe9ab2f4e25e53fc2824e660ef64983bffb28540a84acff1f1405f9fcf9e71
-
SSDEEP
24576:xt5/YykdxNliRCDLYyONm2D9BvbIm1PTg80uGnrwzGdX1R7mV8pvlBPu2VKIhuMn:jNkyRyL2vxTgBR7eQlVu+lgtl/P
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4