General
-
Target
d381a78fa4db5302f27e196158145adf2f40e87a93c5584d7c8b32153a384b32.exe
-
Size
2.0MB
-
Sample
241104-dfghbssanh
-
MD5
a72cb77fb0c900c2c6044eed9c29d077
-
SHA1
78801b5b69ae255cd3b8b1025e4c0a6744e1f0fc
-
SHA256
d381a78fa4db5302f27e196158145adf2f40e87a93c5584d7c8b32153a384b32
-
SHA512
86b72e2786de20668492149f48f70ca77963b9a834cc4919dd09b843bb143873c5019704c5d886fb45be2b61ab995e4c0481e148217d1932e0428ceeaf12cfc6
-
SSDEEP
49152:JOfo+MzSoeCe4FxKD+Kp+Gq1uVGEzARqDz8GRZ:KjMOP0k5pjwHmz8GRZ
Static task
static1
Behavioral task
behavioral1
Sample
d381a78fa4db5302f27e196158145adf2f40e87a93c5584d7c8b32153a384b32.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
d381a78fa4db5302f27e196158145adf2f40e87a93c5584d7c8b32153a384b32.exe
-
Size
2.0MB
-
MD5
a72cb77fb0c900c2c6044eed9c29d077
-
SHA1
78801b5b69ae255cd3b8b1025e4c0a6744e1f0fc
-
SHA256
d381a78fa4db5302f27e196158145adf2f40e87a93c5584d7c8b32153a384b32
-
SHA512
86b72e2786de20668492149f48f70ca77963b9a834cc4919dd09b843bb143873c5019704c5d886fb45be2b61ab995e4c0481e148217d1932e0428ceeaf12cfc6
-
SSDEEP
49152:JOfo+MzSoeCe4FxKD+Kp+Gq1uVGEzARqDz8GRZ:KjMOP0k5pjwHmz8GRZ
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-