General
-
Target
file.exe
-
Size
2.0MB
-
Sample
241106-2w85aazfrr
-
MD5
3bfc4d0c1919dcab09a734d1a552a012
-
SHA1
b748424b48ec7e52ae249566d9a6edceaed3691d
-
SHA256
7984d55eb2702a1d13486c38ebfff582138d73280895dac749b9ec6010f891f3
-
SHA512
e8a411d0342774913ccaddcd3767c518ed3bfac1b52f9f8a263b45a132cf2c043106dc1404e1d5a36c5cbb01b81a0a54b4a4a89007bf320bfb9d8416607fd4ca
-
SSDEEP
49152:iotH+obcn30mlAAliS/UgOfGuxFfbPE41Oouct8Pq:xteobcEqcdgcfjE49uct8Pq
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241023-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
file.exe
-
Size
2.0MB
-
MD5
3bfc4d0c1919dcab09a734d1a552a012
-
SHA1
b748424b48ec7e52ae249566d9a6edceaed3691d
-
SHA256
7984d55eb2702a1d13486c38ebfff582138d73280895dac749b9ec6010f891f3
-
SHA512
e8a411d0342774913ccaddcd3767c518ed3bfac1b52f9f8a263b45a132cf2c043106dc1404e1d5a36c5cbb01b81a0a54b4a4a89007bf320bfb9d8416607fd4ca
-
SSDEEP
49152:iotH+obcn30mlAAliS/UgOfGuxFfbPE41Oouct8Pq:xteobcEqcdgcfjE49uct8Pq
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-