General
-
Target
a14d98efb427a2f880155d0f0e6c5983ad1046283ccd2503d4e6689d7852b074.exe
-
Size
2.1MB
-
Sample
241107-ddgejssqev
-
MD5
4a1ecd263f814b6e853f0fb85f405a79
-
SHA1
a41ff8ee67a1965ab0f13e9a8a6432338ba806bc
-
SHA256
a14d98efb427a2f880155d0f0e6c5983ad1046283ccd2503d4e6689d7852b074
-
SHA512
ec0d2b0cc8cd1c9d9957a36e85c368eeaa5dd1b7bfea29048bc8bdcb3b04a4e2cee0848a3838638d4c4924948d4b490b310a5ae84a7680ba038a38b19d5ef819
-
SSDEEP
49152:7AKMUq8dRQ5/PUyj5GLVNMP/G2FX34pw6YTQd:aWdRMPjQVNMP/GmYw6YTQd
Static task
static1
Behavioral task
behavioral1
Sample
a14d98efb427a2f880155d0f0e6c5983ad1046283ccd2503d4e6689d7852b074.exe
Resource
win7-20240729-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
a14d98efb427a2f880155d0f0e6c5983ad1046283ccd2503d4e6689d7852b074.exe
-
Size
2.1MB
-
MD5
4a1ecd263f814b6e853f0fb85f405a79
-
SHA1
a41ff8ee67a1965ab0f13e9a8a6432338ba806bc
-
SHA256
a14d98efb427a2f880155d0f0e6c5983ad1046283ccd2503d4e6689d7852b074
-
SHA512
ec0d2b0cc8cd1c9d9957a36e85c368eeaa5dd1b7bfea29048bc8bdcb3b04a4e2cee0848a3838638d4c4924948d4b490b310a5ae84a7680ba038a38b19d5ef819
-
SSDEEP
49152:7AKMUq8dRQ5/PUyj5GLVNMP/G2FX34pw6YTQd:aWdRMPjQVNMP/GmYw6YTQd
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-