General
-
Target
aa740dd00e547371c5430c80ad68920770d370907e8b21c9ae7dd7cbf65de9e9.exe
-
Size
2.0MB
-
Sample
241107-detfhatfrd
-
MD5
0ce27875032397642b45786f596daf0b
-
SHA1
4762a80e81b4f95479ebbadcc857e74bdc48bc2e
-
SHA256
aa740dd00e547371c5430c80ad68920770d370907e8b21c9ae7dd7cbf65de9e9
-
SHA512
b73dcfe538ab4eac2a6cb63c6fc485a9fefa3f3637b47eb5a70c5350f304c4e8591f3f6856206c0f98221d2bf7fb42bff6b175b028f23ab8c9afbefac60fbdb6
-
SSDEEP
49152:1hDUrRnvgjOVVZyWO9JxcRAk3PNYIDXyUS:1arRn4gyVxcRGsXy
Static task
static1
Behavioral task
behavioral1
Sample
aa740dd00e547371c5430c80ad68920770d370907e8b21c9ae7dd7cbf65de9e9.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
aa740dd00e547371c5430c80ad68920770d370907e8b21c9ae7dd7cbf65de9e9.exe
-
Size
2.0MB
-
MD5
0ce27875032397642b45786f596daf0b
-
SHA1
4762a80e81b4f95479ebbadcc857e74bdc48bc2e
-
SHA256
aa740dd00e547371c5430c80ad68920770d370907e8b21c9ae7dd7cbf65de9e9
-
SHA512
b73dcfe538ab4eac2a6cb63c6fc485a9fefa3f3637b47eb5a70c5350f304c4e8591f3f6856206c0f98221d2bf7fb42bff6b175b028f23ab8c9afbefac60fbdb6
-
SSDEEP
49152:1hDUrRnvgjOVVZyWO9JxcRAk3PNYIDXyUS:1arRn4gyVxcRGsXy
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-