General
-
Target
8027fb5b61305a3b8b76e8f4494d22112bba0b404cdf34e4d67f5522b2691fb2
-
Size
2.0MB
-
Sample
241105-lhsblsycqa
-
MD5
74bb55a474b1c94e55193bbd6fd37364
-
SHA1
101b1afbeca11fb3953fe22c4d0557ba93db7330
-
SHA256
8027fb5b61305a3b8b76e8f4494d22112bba0b404cdf34e4d67f5522b2691fb2
-
SHA512
5b52d323e8c561dd75e249a5265959bd46557ecf61691c4f516a2f541da693988c3b917fbcc8d58b605e4d7c7687aeea3c5510b9e0c5f4324944025532fa42a1
-
SSDEEP
24576:gd8HBNAOGZa2fmZPYtCgfFM9Ca7eZ3XtGIWU0dqji/y0SRfa35FLdjnStCyu98kC:g/ZaXQlG7EHtMaOyTubdetCj95WLs
Static task
static1
Behavioral task
behavioral1
Sample
8027fb5b61305a3b8b76e8f4494d22112bba0b404cdf34e4d67f5522b2691fb2.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
8027fb5b61305a3b8b76e8f4494d22112bba0b404cdf34e4d67f5522b2691fb2
-
Size
2.0MB
-
MD5
74bb55a474b1c94e55193bbd6fd37364
-
SHA1
101b1afbeca11fb3953fe22c4d0557ba93db7330
-
SHA256
8027fb5b61305a3b8b76e8f4494d22112bba0b404cdf34e4d67f5522b2691fb2
-
SHA512
5b52d323e8c561dd75e249a5265959bd46557ecf61691c4f516a2f541da693988c3b917fbcc8d58b605e4d7c7687aeea3c5510b9e0c5f4324944025532fa42a1
-
SSDEEP
24576:gd8HBNAOGZa2fmZPYtCgfFM9Ca7eZ3XtGIWU0dqji/y0SRfa35FLdjnStCyu98kC:g/ZaXQlG7EHtMaOyTubdetCj95WLs
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-