General
-
Target
file.exe
-
Size
1.8MB
-
Sample
241010-cez3lsvald
-
MD5
cfdcb2c10395a747af1312fd52152292
-
SHA1
819cf005b7fd0f51d51d1c19d502d9a87041ac69
-
SHA256
4982fc46ba41004c2e8fdb584f1232ab8241a440b619bbc7040844df32f74aa3
-
SHA512
76cf31b317fc27156f048085f457092daebb97454cbc179010b3f7134ed78886893b9c7e0c6cd48bf9d05d179f7ecacdb6b47a107184d9c62b02d3f4d8647467
-
SSDEEP
49152:bmnw06ikk3xcZNDZ++K0vu6vMjZX8aUMM6r1DnW:bmnPJ3xE+QGJjy/M8
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
file.exe
-
Size
1.8MB
-
MD5
cfdcb2c10395a747af1312fd52152292
-
SHA1
819cf005b7fd0f51d51d1c19d502d9a87041ac69
-
SHA256
4982fc46ba41004c2e8fdb584f1232ab8241a440b619bbc7040844df32f74aa3
-
SHA512
76cf31b317fc27156f048085f457092daebb97454cbc179010b3f7134ed78886893b9c7e0c6cd48bf9d05d179f7ecacdb6b47a107184d9c62b02d3f4d8647467
-
SSDEEP
49152:bmnw06ikk3xcZNDZ++K0vu6vMjZX8aUMM6r1DnW:bmnPJ3xE+QGJjy/M8
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-