General
-
Target
85424194e3012b5970ef13dda8861ae7.bin
-
Size
1.7MB
-
Sample
241027-btjhqs1grg
-
MD5
435d817c386f267f8f7eef6c962f8c6e
-
SHA1
72d10b1bde1218bb2606a240b528f630ae609d07
-
SHA256
9ad8ef7e2d4352996793f937032dbfc063e31477093e3f6689b46bd1b5b7fd81
-
SHA512
d8b4db02ec427aa8ebb76765151522fcfdb2d7dc968a4bbd13b4093497f4b0f3c4df946e415503b4187d71fc9d88250c22709121747c227ca31816215c7e36e4
-
SSDEEP
49152:mnKD/2vF/fFrNhcls8XzC5EKzImTO+qT92+U4JK9Q:vD/29/Ws8zCCXHT92WK2
Static task
static1
Behavioral task
behavioral1
Sample
52957d4501c8b066b7208e418ddb49848c116905b2a8c3d37366ed188fb99eda.exe
Resource
win7-20241010-en
Malware Config
Extracted
stealc
doma
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
52957d4501c8b066b7208e418ddb49848c116905b2a8c3d37366ed188fb99eda.exe
-
Size
1.8MB
-
MD5
85424194e3012b5970ef13dda8861ae7
-
SHA1
d3464cf08ff3e16c81d08cefd1c6159c0a501a31
-
SHA256
52957d4501c8b066b7208e418ddb49848c116905b2a8c3d37366ed188fb99eda
-
SHA512
a24b6a7a8aaf431f584d38f3bee62c948ddaa488fc6d3c720ea39a1b1e47db1e4449211f36de14a50d66380b5bf2a722b125db6c23143b7de9a1e9941f6a396a
-
SSDEEP
49152:8gaeIscyHv+wLZNB/vpjqB/s1qoI5mfIG+9xRe:8gVIZyFZLvMGEx5m1k3e
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-