General
-
Target
2c1bd458de96fe88a598ed1668e614979a6c3caa9cbf150a5181faaf7d96b047.exe
-
Size
2.0MB
-
Sample
241104-cpmv2azmf1
-
MD5
5ba2afcc26649c37e605a70fe412ca35
-
SHA1
bbba659d5ea75b6b3599dc110e8faff8a239fd57
-
SHA256
2c1bd458de96fe88a598ed1668e614979a6c3caa9cbf150a5181faaf7d96b047
-
SHA512
d47f9856804ada2b6d73493173a9fa0fb94d7f78abeefb344813b77ab1050f8b9d0cda15dd0e36c035b537930b9b8d28939a26f61dfbf08531a5803e5711bc50
-
SSDEEP
49152:qw9TbwsAWocvG6S5t5zbHX1XVWV4J6AaXten1Fh:qw9TbwhWouS53P16g6AaXC1F
Static task
static1
Behavioral task
behavioral1
Sample
2c1bd458de96fe88a598ed1668e614979a6c3caa9cbf150a5181faaf7d96b047.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
2c1bd458de96fe88a598ed1668e614979a6c3caa9cbf150a5181faaf7d96b047.exe
-
Size
2.0MB
-
MD5
5ba2afcc26649c37e605a70fe412ca35
-
SHA1
bbba659d5ea75b6b3599dc110e8faff8a239fd57
-
SHA256
2c1bd458de96fe88a598ed1668e614979a6c3caa9cbf150a5181faaf7d96b047
-
SHA512
d47f9856804ada2b6d73493173a9fa0fb94d7f78abeefb344813b77ab1050f8b9d0cda15dd0e36c035b537930b9b8d28939a26f61dfbf08531a5803e5711bc50
-
SSDEEP
49152:qw9TbwsAWocvG6S5t5zbHX1XVWV4J6AaXten1Fh:qw9TbwhWouS53P16g6AaXC1F
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-