General
-
Target
073df3ae205c8e564ce589b7a590cb5ff00ceed9eb984354a559355ae24cee5f
-
Size
2.0MB
-
Sample
241107-tnwj8avhra
-
MD5
d488e0b4b23af8f848a6708747d7b266
-
SHA1
0d502db8350e5b92787c523db125bcbbeb1495a7
-
SHA256
073df3ae205c8e564ce589b7a590cb5ff00ceed9eb984354a559355ae24cee5f
-
SHA512
429e688a8c7cf0762573da76527aea5934acd7c6f42f065cc8271e76d3264d281a694f87054d56f8dbf7de25ec5db0f64d73c0d76b47cb6a5f8d8fb0598a6e83
-
SSDEEP
49152:bEoQiixW7mdXPwZPJKrO8KXLJ4Dwd+kHuYzI2XECW:ooO3cJKA144HuuI2Xv
Static task
static1
Behavioral task
behavioral1
Sample
073df3ae205c8e564ce589b7a590cb5ff00ceed9eb984354a559355ae24cee5f.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
073df3ae205c8e564ce589b7a590cb5ff00ceed9eb984354a559355ae24cee5f
-
Size
2.0MB
-
MD5
d488e0b4b23af8f848a6708747d7b266
-
SHA1
0d502db8350e5b92787c523db125bcbbeb1495a7
-
SHA256
073df3ae205c8e564ce589b7a590cb5ff00ceed9eb984354a559355ae24cee5f
-
SHA512
429e688a8c7cf0762573da76527aea5934acd7c6f42f065cc8271e76d3264d281a694f87054d56f8dbf7de25ec5db0f64d73c0d76b47cb6a5f8d8fb0598a6e83
-
SSDEEP
49152:bEoQiixW7mdXPwZPJKrO8KXLJ4Dwd+kHuYzI2XECW:ooO3cJKA144HuuI2Xv
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-