General
-
Target
f4877ae52d445d968d573c3329181ea34c95fbe77f1acc6ee4cf0d1d25378634
-
Size
2.0MB
-
Sample
241105-vdcj2avhmq
-
MD5
4ad838d33cbcc589a2cfe7b88b83a906
-
SHA1
c40f76622aecee12aa9473c95f330efb89c4bd47
-
SHA256
f4877ae52d445d968d573c3329181ea34c95fbe77f1acc6ee4cf0d1d25378634
-
SHA512
65fc275e8651e17833b3672792cc1716801b08e84448c3fdb7a152d0bdb8cda626fa9398475c4d863ead4dd4a46ba295d5f84e758a0171099aaeee7f91c3bf11
-
SSDEEP
49152:tVUU6shvFK0gb/0bVoymLczAPv85Z0181X6myC:twshtM/UmiF5Z48wrC
Static task
static1
Behavioral task
behavioral1
Sample
f4877ae52d445d968d573c3329181ea34c95fbe77f1acc6ee4cf0d1d25378634.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
f4877ae52d445d968d573c3329181ea34c95fbe77f1acc6ee4cf0d1d25378634
-
Size
2.0MB
-
MD5
4ad838d33cbcc589a2cfe7b88b83a906
-
SHA1
c40f76622aecee12aa9473c95f330efb89c4bd47
-
SHA256
f4877ae52d445d968d573c3329181ea34c95fbe77f1acc6ee4cf0d1d25378634
-
SHA512
65fc275e8651e17833b3672792cc1716801b08e84448c3fdb7a152d0bdb8cda626fa9398475c4d863ead4dd4a46ba295d5f84e758a0171099aaeee7f91c3bf11
-
SSDEEP
49152:tVUU6shvFK0gb/0bVoymLczAPv85Z0181X6myC:twshtM/UmiF5Z48wrC
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-