General
-
Target
70c7b439aeda37b4896a9cd24bd54bc7d74807225fd089c9a25f53770ccacb99.exe
-
Size
2.1MB
-
Sample
241103-dhkyjatbqm
-
MD5
1f4e85e8541293a8523af48c32a7ef8d
-
SHA1
eec1dbd5cd57e1448c4576018e73ca7b36ce31b6
-
SHA256
70c7b439aeda37b4896a9cd24bd54bc7d74807225fd089c9a25f53770ccacb99
-
SHA512
a04a4f734ededafadde979a42dc1e38f72abe0227fef8e2702245a9f4907ed7ef4dc86e0ce794d376151dac765fd002175b5cf59d2c0e774b2a15f5cad1b2613
-
SSDEEP
49152:lSZZR9Ehbf98rxbme2OZlo9ej2epAHgGlcB0K2+JMMz:oZZR9Ehr9kbmeeO2eStiB0KD
Static task
static1
Behavioral task
behavioral1
Sample
70c7b439aeda37b4896a9cd24bd54bc7d74807225fd089c9a25f53770ccacb99.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
70c7b439aeda37b4896a9cd24bd54bc7d74807225fd089c9a25f53770ccacb99.exe
-
Size
2.1MB
-
MD5
1f4e85e8541293a8523af48c32a7ef8d
-
SHA1
eec1dbd5cd57e1448c4576018e73ca7b36ce31b6
-
SHA256
70c7b439aeda37b4896a9cd24bd54bc7d74807225fd089c9a25f53770ccacb99
-
SHA512
a04a4f734ededafadde979a42dc1e38f72abe0227fef8e2702245a9f4907ed7ef4dc86e0ce794d376151dac765fd002175b5cf59d2c0e774b2a15f5cad1b2613
-
SSDEEP
49152:lSZZR9Ehbf98rxbme2OZlo9ej2epAHgGlcB0K2+JMMz:oZZR9Ehr9kbmeeO2eStiB0KD
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-