General
-
Target
0c44b1e62d18eea3f88bef633e00cb76ce51eab57d3cd540888ae5dcedc0de09.exe
-
Size
2.0MB
-
Sample
241102-c2nm4axgqc
-
MD5
5dfde5204e8a2051cf417be38fd12615
-
SHA1
e97fd3ca4b58e1b3bd1eb562691d1c79015197cb
-
SHA256
0c44b1e62d18eea3f88bef633e00cb76ce51eab57d3cd540888ae5dcedc0de09
-
SHA512
0e991a5c1b1224556cc758ff362dea82466126cfe35b69f7d4dbd8168d193b51bd989615ea5e7a028f2415d5acc05c1754e2a070fd37b8955cd94f3fda1a9501
-
SSDEEP
49152:7hSIL4RZXN+HmrhVhzjjSpNU/4xDTe3+f4o:7S9+Hm/Ui/gNg
Static task
static1
Behavioral task
behavioral1
Sample
0c44b1e62d18eea3f88bef633e00cb76ce51eab57d3cd540888ae5dcedc0de09.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
0c44b1e62d18eea3f88bef633e00cb76ce51eab57d3cd540888ae5dcedc0de09.exe
-
Size
2.0MB
-
MD5
5dfde5204e8a2051cf417be38fd12615
-
SHA1
e97fd3ca4b58e1b3bd1eb562691d1c79015197cb
-
SHA256
0c44b1e62d18eea3f88bef633e00cb76ce51eab57d3cd540888ae5dcedc0de09
-
SHA512
0e991a5c1b1224556cc758ff362dea82466126cfe35b69f7d4dbd8168d193b51bd989615ea5e7a028f2415d5acc05c1754e2a070fd37b8955cd94f3fda1a9501
-
SSDEEP
49152:7hSIL4RZXN+HmrhVhzjjSpNU/4xDTe3+f4o:7S9+Hm/Ui/gNg
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-