General
-
Target
4a1ecd263f814b6e853f0fb85f405a79.bin
-
Size
2.0MB
-
Sample
241108-bpqfgsvjgn
-
MD5
15ea629782c4f950f1d5842ff653f513
-
SHA1
d585c58a12406cc689aa755f16c082718d97828a
-
SHA256
9ee987dec82661c24fefb273715d9c076f90e03500b540b0b21df5b432749036
-
SHA512
18f3875dfbbc443bdf26a03cb0a3b3e033ab79e7b6f05fe43672f5f644efece868d9a08c2b0d132db21ab4bb64d7308886ab504fee87cdde914329347d78a19b
-
SSDEEP
49152:2nmviE0BwJimnIS5IHH6DW8pe6YoFOLoA0pz7dVnqDx:cvHzmISWHaDLpe6YGnbHox
Static task
static1
Behavioral task
behavioral1
Sample
a14d98efb427a2f880155d0f0e6c5983ad1046283ccd2503d4e6689d7852b074.exe
Resource
win7-20240708-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
a14d98efb427a2f880155d0f0e6c5983ad1046283ccd2503d4e6689d7852b074.exe
-
Size
2.1MB
-
MD5
4a1ecd263f814b6e853f0fb85f405a79
-
SHA1
a41ff8ee67a1965ab0f13e9a8a6432338ba806bc
-
SHA256
a14d98efb427a2f880155d0f0e6c5983ad1046283ccd2503d4e6689d7852b074
-
SHA512
ec0d2b0cc8cd1c9d9957a36e85c368eeaa5dd1b7bfea29048bc8bdcb3b04a4e2cee0848a3838638d4c4924948d4b490b310a5ae84a7680ba038a38b19d5ef819
-
SSDEEP
49152:7AKMUq8dRQ5/PUyj5GLVNMP/G2FX34pw6YTQd:aWdRMPjQVNMP/GmYw6YTQd
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-