General
-
Target
file.exe
-
Size
2.0MB
-
Sample
241106-qxc8fs1grk
-
MD5
c6803fd47d7c37714fa05cbcc77fe0de
-
SHA1
b4ba38d409c9911ae4680f82233ac8b31a0e3258
-
SHA256
45f23de788e07c6690b6a6ee1ab65e078f54441a5f3824471e5b1a7a58352c22
-
SHA512
2636760f7dc83e67660c0280050587fa8c0f91a51ee6a3d3849cb698fc74ca4204d1b159106520dc5202d225109479b4bea5d8457435651c21f836a28d9ec443
-
SSDEEP
49152:lDMU7buRyge/4iub/y2LgK2HaLwaN+V4Q5uZ5CO9d:lT7Yygegil2GHaMa24z5CI
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
file.exe
-
Size
2.0MB
-
MD5
c6803fd47d7c37714fa05cbcc77fe0de
-
SHA1
b4ba38d409c9911ae4680f82233ac8b31a0e3258
-
SHA256
45f23de788e07c6690b6a6ee1ab65e078f54441a5f3824471e5b1a7a58352c22
-
SHA512
2636760f7dc83e67660c0280050587fa8c0f91a51ee6a3d3849cb698fc74ca4204d1b159106520dc5202d225109479b4bea5d8457435651c21f836a28d9ec443
-
SSDEEP
49152:lDMU7buRyge/4iub/y2LgK2HaLwaN+V4Q5uZ5CO9d:lT7Yygegil2GHaMa24z5CI
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-