General
-
Target
64bb34c9be3d445cb44c59b49d1d4be1e95f5526889d212eb09e6771eb8e3d52
-
Size
2.0MB
-
Sample
241105-q47ewashpj
-
MD5
4d05128141d95bb1f45074d57b90114e
-
SHA1
47ad114e219e3bdcd1febcba374727cb30c819d0
-
SHA256
64bb34c9be3d445cb44c59b49d1d4be1e95f5526889d212eb09e6771eb8e3d52
-
SHA512
be4981537e33dfcbe0ea77ab2eb0151f87fe4e7fce867684e7f833225fca23d19166c5792a7abd6c2cb85aaadeff50bfbf39c36cbf8ee18bb4fe162c4fff214c
-
SSDEEP
49152:+OfQYC/KDzXLMa1nizNvaGQH9O4lpKVbOsGLVxrjm:+n6z7Ma1n0aGQH9jmVbOsO7jm
Static task
static1
Behavioral task
behavioral1
Sample
64bb34c9be3d445cb44c59b49d1d4be1e95f5526889d212eb09e6771eb8e3d52.exe
Resource
win7-20241010-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
64bb34c9be3d445cb44c59b49d1d4be1e95f5526889d212eb09e6771eb8e3d52
-
Size
2.0MB
-
MD5
4d05128141d95bb1f45074d57b90114e
-
SHA1
47ad114e219e3bdcd1febcba374727cb30c819d0
-
SHA256
64bb34c9be3d445cb44c59b49d1d4be1e95f5526889d212eb09e6771eb8e3d52
-
SHA512
be4981537e33dfcbe0ea77ab2eb0151f87fe4e7fce867684e7f833225fca23d19166c5792a7abd6c2cb85aaadeff50bfbf39c36cbf8ee18bb4fe162c4fff214c
-
SSDEEP
49152:+OfQYC/KDzXLMa1nizNvaGQH9O4lpKVbOsGLVxrjm:+n6z7Ma1n0aGQH9jmVbOsO7jm
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-