General
-
Target
file.exe
-
Size
2.0MB
-
Sample
241102-1aqv5svrcw
-
MD5
abe2d3c6c95bc4eb7fd24fd8095b4104
-
SHA1
48c25f37cb652c70008b7fe0d041a212dace5398
-
SHA256
2b96d5f873119e5a22e3c38f916c311ad7ed5b54bc4b0bbddcbaef3b008e5909
-
SHA512
a4a746a0ab0c191eb70a9f93757cf85d93b94802da18d1c09767fa1f2eb5db0b9415425b79d4ef1a058ba4df7ba79d39432ccd0b227f529d3ef08c2934cd2f09
-
SSDEEP
49152:KV45O6/ToN0RUydwwpnsDXzfPnQV5/HT/vjx9/4z:K6O4ToN0OYpezw5/T/v/4z
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
file.exe
-
Size
2.0MB
-
MD5
abe2d3c6c95bc4eb7fd24fd8095b4104
-
SHA1
48c25f37cb652c70008b7fe0d041a212dace5398
-
SHA256
2b96d5f873119e5a22e3c38f916c311ad7ed5b54bc4b0bbddcbaef3b008e5909
-
SHA512
a4a746a0ab0c191eb70a9f93757cf85d93b94802da18d1c09767fa1f2eb5db0b9415425b79d4ef1a058ba4df7ba79d39432ccd0b227f529d3ef08c2934cd2f09
-
SSDEEP
49152:KV45O6/ToN0RUydwwpnsDXzfPnQV5/HT/vjx9/4z:K6O4ToN0OYpezw5/T/v/4z
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-