General
-
Target
8ed1f28fe0588fd7e27b22329ba5c2cbed9bf6aeec4e2e4dbe2cf751f2f1d629.exe
-
Size
1.8MB
-
Sample
241002-btaktszfpm
-
MD5
564e5677e7262707df20c3ea7f110513
-
SHA1
be8c6288b0baf0bd470e6ab8174e85c03470e0f5
-
SHA256
8ed1f28fe0588fd7e27b22329ba5c2cbed9bf6aeec4e2e4dbe2cf751f2f1d629
-
SHA512
32512119af4d302374cb3abf690ca20ddeaf99d542e91840b92f3ec3d04bb201e62cc785c2464db67011d010ea5ea0de08b6ae9d176c69d5ddf6f608123ed81c
-
SSDEEP
49152:O5J2ApiaFNyPOqc9Tw0hUiunNiAfuetwA3tsPdDxnz7:O5JnXNym19k0hUiu8Ameth3G1Dh
Static task
static1
Behavioral task
behavioral1
Sample
8ed1f28fe0588fd7e27b22329ba5c2cbed9bf6aeec4e2e4dbe2cf751f2f1d629.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
8ed1f28fe0588fd7e27b22329ba5c2cbed9bf6aeec4e2e4dbe2cf751f2f1d629.exe
-
Size
1.8MB
-
MD5
564e5677e7262707df20c3ea7f110513
-
SHA1
be8c6288b0baf0bd470e6ab8174e85c03470e0f5
-
SHA256
8ed1f28fe0588fd7e27b22329ba5c2cbed9bf6aeec4e2e4dbe2cf751f2f1d629
-
SHA512
32512119af4d302374cb3abf690ca20ddeaf99d542e91840b92f3ec3d04bb201e62cc785c2464db67011d010ea5ea0de08b6ae9d176c69d5ddf6f608123ed81c
-
SSDEEP
49152:O5J2ApiaFNyPOqc9Tw0hUiunNiAfuetwA3tsPdDxnz7:O5JnXNym19k0hUiu8Ameth3G1Dh
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-