General
-
Target
file.exe
-
Size
2.0MB
-
Sample
241105-vppczavdpd
-
MD5
0625bfb508155bf72c447f0819c545a5
-
SHA1
fb030eced8eb89cb25dbb78712cf38476bb959a0
-
SHA256
42321395d0e8e8706391651a061c178878218698ebc6c1a6e2aaaa0d38c23b2b
-
SHA512
b19347b046267d036c735bb4c60d66611caab634c878f8d6b104738dcd617d22de377f87cd35a1b2a25be42e30a8ba25cbee4b6293d5d048a0291815c7ba7c05
-
SSDEEP
49152:DTwsevJGmtkr7AjOENmCOsPo08CUG+UbREOj4CXD3g7:DTSJGmLj9NMcz8CrNRbj4Cz3g7
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
file.exe
-
Size
2.0MB
-
MD5
0625bfb508155bf72c447f0819c545a5
-
SHA1
fb030eced8eb89cb25dbb78712cf38476bb959a0
-
SHA256
42321395d0e8e8706391651a061c178878218698ebc6c1a6e2aaaa0d38c23b2b
-
SHA512
b19347b046267d036c735bb4c60d66611caab634c878f8d6b104738dcd617d22de377f87cd35a1b2a25be42e30a8ba25cbee4b6293d5d048a0291815c7ba7c05
-
SSDEEP
49152:DTwsevJGmtkr7AjOENmCOsPo08CUG+UbREOj4CXD3g7:DTSJGmLj9NMcz8CrNRbj4Cz3g7
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-