General
-
Target
2fde3af8c4c3f8d48b84383c63dab715.bin
-
Size
2.0MB
-
Sample
241108-bk68favjbn
-
MD5
24b184e406ff9899a665f1157050ea9f
-
SHA1
a99399e50342e7084b66145561bcdc8d537f4506
-
SHA256
953197b134ab6b25a32e71bd0ed18ca5a4e51b2292ed784099d8c48c52f87186
-
SHA512
f8bc3e40c16a40ab2741f1de575e46bbe5c6b8e2142c2840c067d80b31fa0cefe9154451f031756978746030e26e96341601dba76cb9ff42ed086ed196695803
-
SSDEEP
49152:VugledhUp0PboUUg2iTa8RNVZD16507nizenjeTH4b/:Pea5UX2qNzD16502Fc7
Static task
static1
Behavioral task
behavioral1
Sample
0f080dc2456a574a26e769774b11917771e160adaf7c47e07c314e9fcd83cb5a.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
0f080dc2456a574a26e769774b11917771e160adaf7c47e07c314e9fcd83cb5a.exe
-
Size
2.0MB
-
MD5
2fde3af8c4c3f8d48b84383c63dab715
-
SHA1
f4463eb91c104176825e01a0f345e6ec732e8119
-
SHA256
0f080dc2456a574a26e769774b11917771e160adaf7c47e07c314e9fcd83cb5a
-
SHA512
6ab59be279b47f0c4a9496057b488bb2f85776f79d1e50925a75584adc37d75f6d359b487e0957049e6a5537c6873ec7feec43a828c31af67e56982239b87168
-
SSDEEP
49152:ldIuId3HGYCCyyoe6HqAxaNAxpfMhysQ4u9V:/5Id2YQtqPNOpf74u
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-