General
-
Target
file.exe
-
Size
1.8MB
-
Sample
241012-qjx1pssdmf
-
MD5
1135c570f464f08f59b950e9cf46172d
-
SHA1
3e4d4751cf92923d16bd6b96f05d64a7c8c312e1
-
SHA256
d817ae9bfb8a36ec03ba9dea7d48ee06f5a76dc29e32d61e163853801e973662
-
SHA512
144da2cfaeb78390f90a6dd57e3d66bfe5bcb562919a69210513e3371b300aac0227228fed6991b158e66a4d25a3517aaf1d85d984b87db3590729676f305c75
-
SSDEEP
49152:X8raKRRoYkctlnqxp9OCpr33WXED+FdVl7q41JRIr3DG:o5roUt8b0CprFyVFq4FIrzG
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
file.exe
-
Size
1.8MB
-
MD5
1135c570f464f08f59b950e9cf46172d
-
SHA1
3e4d4751cf92923d16bd6b96f05d64a7c8c312e1
-
SHA256
d817ae9bfb8a36ec03ba9dea7d48ee06f5a76dc29e32d61e163853801e973662
-
SHA512
144da2cfaeb78390f90a6dd57e3d66bfe5bcb562919a69210513e3371b300aac0227228fed6991b158e66a4d25a3517aaf1d85d984b87db3590729676f305c75
-
SSDEEP
49152:X8raKRRoYkctlnqxp9OCpr33WXED+FdVl7q41JRIr3DG:o5roUt8b0CprFyVFq4FIrzG
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-