General
-
Target
c17ed24e02488677c15a7f9af66a0aba.bin
-
Size
2.0MB
-
Sample
241108-b22paasdpn
-
MD5
4ba07a79fa83af14c1186920b5977074
-
SHA1
1565efc3ac4090b9e3c78a3b58c6cf0aad1be5b7
-
SHA256
2c960792085f3acc9c0f040e7c5adea2c6e904f4f1b554f6537d3fc8890913f5
-
SHA512
8b65d33e3c9e705b4aef4785743133b013f16e1d0018ecef3a035ba390637ff16bedca76dac35e6c3d97703a8483eecb440efc67e862f863aa18349de615df88
-
SSDEEP
49152:q3bfhAQshLeitLscOMiW07DgSTMFNn+eVjkwIl9QX04Wp4:q3bfCQkptLtfd07DGBn6wm2kY
Static task
static1
Behavioral task
behavioral1
Sample
61503aab6e8bb537631115556cf898894274211cae16c143081c2912532a018e.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
61503aab6e8bb537631115556cf898894274211cae16c143081c2912532a018e.exe
-
Size
2.0MB
-
MD5
c17ed24e02488677c15a7f9af66a0aba
-
SHA1
222cf4373cb4d9f05dccd3e2745a4b19cb4dd29f
-
SHA256
61503aab6e8bb537631115556cf898894274211cae16c143081c2912532a018e
-
SHA512
031737664e0233b9e3f96bb19263d6b02de181255c9ab78fc7d8bdebd7733e5e67652715222fdfcb6d1303648bdd01a8b5da6f21adf6ad85fafccdf16b7fb451
-
SSDEEP
49152:l+UT9u2iXY1pBSxJs/OjJcUgzQZobZo1W:l+sZiXYZSPy19o1W
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-