General
-
Target
26711a4c32193e82db0ecc58bfc95d9482f111d1389314029432f228fbdb75e0.exe
-
Size
2.0MB
-
Sample
241108-cs8xnsslfs
-
MD5
fdd09e1d35cbc3837a26255801aacb53
-
SHA1
c6a5b12ae933c9cb222b3d8a5ebb4bd432e22b95
-
SHA256
26711a4c32193e82db0ecc58bfc95d9482f111d1389314029432f228fbdb75e0
-
SHA512
7f52301a06f6f0fb4d6eaf07a784e45a9cd9bb275754aae59bf1a2139af1304d296da21777e2c0e52f2b8c876a4cea5ef35a6bd574135b1256714d6304087750
-
SSDEEP
49152:4jcIeE9yj6mFGZ3fF2tTuLDnyMCNhYHz/6Ek5l:4jcIlQDFM3mTuHCNAGr
Static task
static1
Behavioral task
behavioral1
Sample
26711a4c32193e82db0ecc58bfc95d9482f111d1389314029432f228fbdb75e0.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
26711a4c32193e82db0ecc58bfc95d9482f111d1389314029432f228fbdb75e0.exe
-
Size
2.0MB
-
MD5
fdd09e1d35cbc3837a26255801aacb53
-
SHA1
c6a5b12ae933c9cb222b3d8a5ebb4bd432e22b95
-
SHA256
26711a4c32193e82db0ecc58bfc95d9482f111d1389314029432f228fbdb75e0
-
SHA512
7f52301a06f6f0fb4d6eaf07a784e45a9cd9bb275754aae59bf1a2139af1304d296da21777e2c0e52f2b8c876a4cea5ef35a6bd574135b1256714d6304087750
-
SSDEEP
49152:4jcIeE9yj6mFGZ3fF2tTuLDnyMCNhYHz/6Ek5l:4jcIlQDFM3mTuHCNAGr
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-