General
-
Target
file.exe
-
Size
2.0MB
-
Sample
241102-x13qvatbnr
-
MD5
1bf461779eb876c22febcf57a93e133c
-
SHA1
30f613d91f56d7408c19736201954df271ada0eb
-
SHA256
7ef6f8903d80be0dc3af420012092b2fea9585b2aa7956677907fa2fd781591a
-
SHA512
d35e71fe35808c36f78265f11890eca9b98b75746b9d10136fdda04fcacb4f8ec7c5df5affab34edab76253d328bf5a50a26fe8b16752345d0a10dde27f1b280
-
SSDEEP
49152:EHrx1RVSz6aD219dBFYE0JUReFpfdO0vwJJ0f/kEtHYTtKZ:+rXRVSz6iA9nFYhUup3IJAZtb
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
file.exe
-
Size
2.0MB
-
MD5
1bf461779eb876c22febcf57a93e133c
-
SHA1
30f613d91f56d7408c19736201954df271ada0eb
-
SHA256
7ef6f8903d80be0dc3af420012092b2fea9585b2aa7956677907fa2fd781591a
-
SHA512
d35e71fe35808c36f78265f11890eca9b98b75746b9d10136fdda04fcacb4f8ec7c5df5affab34edab76253d328bf5a50a26fe8b16752345d0a10dde27f1b280
-
SSDEEP
49152:EHrx1RVSz6aD219dBFYE0JUReFpfdO0vwJJ0f/kEtHYTtKZ:+rXRVSz6iA9nFYhUup3IJAZtb
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-