General
-
Target
f386701bef4c71636fad340757c93114a39b951ef33c22495b73151a197ab182.exe
-
Size
1.8MB
-
Sample
241023-cdz18awcjd
-
MD5
e15eb316c7fb8c1b1a3de425d19434dd
-
SHA1
689de84ee7fedccde9a650e0785f70b70824fa74
-
SHA256
f386701bef4c71636fad340757c93114a39b951ef33c22495b73151a197ab182
-
SHA512
2b956873e58793e87598ee20778297c42556cc225f6b29559336984eab88c17ee0676d539603f97af8651f0b2a10bd5e13834bc2601e290a3bf6d2b75c498348
-
SSDEEP
49152:2Kwk3lAG0KJYBra8jt6IzhWW8ReYNw0f05No:JwkFYBrt6ohsIta0L
Static task
static1
Behavioral task
behavioral1
Sample
f386701bef4c71636fad340757c93114a39b951ef33c22495b73151a197ab182.exe
Resource
win7-20240708-en
Malware Config
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
f386701bef4c71636fad340757c93114a39b951ef33c22495b73151a197ab182.exe
-
Size
1.8MB
-
MD5
e15eb316c7fb8c1b1a3de425d19434dd
-
SHA1
689de84ee7fedccde9a650e0785f70b70824fa74
-
SHA256
f386701bef4c71636fad340757c93114a39b951ef33c22495b73151a197ab182
-
SHA512
2b956873e58793e87598ee20778297c42556cc225f6b29559336984eab88c17ee0676d539603f97af8651f0b2a10bd5e13834bc2601e290a3bf6d2b75c498348
-
SSDEEP
49152:2Kwk3lAG0KJYBra8jt6IzhWW8ReYNw0f05No:JwkFYBrt6ohsIta0L
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-