General
-
Target
9c62b127d6790b9b7957057a75441bc1a4e5eaf4f5c6c2669e833154739adb00.exe
-
Size
1.7MB
-
Sample
241005-b385rasdmb
-
MD5
5e8286d88eeff93b753e7454a6b431fd
-
SHA1
9cd9b91b5dd298a811d922714c506581e7c27b96
-
SHA256
9c62b127d6790b9b7957057a75441bc1a4e5eaf4f5c6c2669e833154739adb00
-
SHA512
ae137bf10ad26dea6ba088903aab92dfe1a67626549adb92665f77bba791f9403f8ea49b30200663c898cb54ac96725ca29f96d233482927683812cc103f8fdf
-
SSDEEP
49152:wmr6UD38hhPKt/mY9nb5VwuUDhblam9LLV:wa64IJwV9ERxlZLh
Static task
static1
Behavioral task
behavioral1
Sample
9c62b127d6790b9b7957057a75441bc1a4e5eaf4f5c6c2669e833154739adb00.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
9c62b127d6790b9b7957057a75441bc1a4e5eaf4f5c6c2669e833154739adb00.exe
-
Size
1.7MB
-
MD5
5e8286d88eeff93b753e7454a6b431fd
-
SHA1
9cd9b91b5dd298a811d922714c506581e7c27b96
-
SHA256
9c62b127d6790b9b7957057a75441bc1a4e5eaf4f5c6c2669e833154739adb00
-
SHA512
ae137bf10ad26dea6ba088903aab92dfe1a67626549adb92665f77bba791f9403f8ea49b30200663c898cb54ac96725ca29f96d233482927683812cc103f8fdf
-
SSDEEP
49152:wmr6UD38hhPKt/mY9nb5VwuUDhblam9LLV:wa64IJwV9ERxlZLh
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-