General
-
Target
a32b06941c36f3d4b09a2797c2d5fc08.bin
-
Size
2.0MB
-
Sample
241107-b3nttashln
-
MD5
948ba2cc722e8685be6f66df18627dd2
-
SHA1
f0b842fed3a2b767774bfb779bb0043434d8e64f
-
SHA256
57247f1829a1cceb13d9f1a7270935ee6cb0a76ee9dbd24315175cd785846280
-
SHA512
5ff200ea9889b296121feefef9d5b96a6168aee5e88ee05d4d03a07e4165a9019e3bd37f9b256584f891215c1cf408f5b1bdf842e2cb33ffea2c2c5c556ec753
-
SSDEEP
24576:cPU6XD34OmLyrAeEaM8ryaNstuCMxgIUyzYiziV+zBowjnb7iIuUESRg1PEcEQBi:cPV1rr+MGKjnoULGHEQ8Mhw4c+M
Static task
static1
Behavioral task
behavioral1
Sample
d779abd2ed475c8cd4ec720d19d8330f2871ca537c8d7a045bab0bfcea622846.exe
Resource
win7-20241010-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
d779abd2ed475c8cd4ec720d19d8330f2871ca537c8d7a045bab0bfcea622846.exe
-
Size
2.0MB
-
MD5
a32b06941c36f3d4b09a2797c2d5fc08
-
SHA1
3931aa08f0986a8e6a61bb3652aa650789799eec
-
SHA256
d779abd2ed475c8cd4ec720d19d8330f2871ca537c8d7a045bab0bfcea622846
-
SHA512
60517883a43c48377249ca62ce3dfa6edeaa0696dfcc2d2e3e48daa5c2dcfc595b663233ff886f1d522533b384f8c01524229126edbf0f16b35eff2422de5fec
-
SSDEEP
49152:c3VW2wcmpLml3PO6Vq8atLAh3yX/q+JwJjPKi/g:cshcmlmlW6Vq8h0/nqj3
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-