General
-
Target
4857eea4cdb38f5a705744faa7a99a13f69cec9f07e2fbdf1fbfc25c32c731a7
-
Size
2.0MB
-
Sample
241116-3haj8szper
-
MD5
95f58f03abe966d7541f2b73f4e6ba6e
-
SHA1
09ccd41084a1560f5dba038378e4b07f9ce62798
-
SHA256
4857eea4cdb38f5a705744faa7a99a13f69cec9f07e2fbdf1fbfc25c32c731a7
-
SHA512
c4914809c91e806262c1352516a76f1fab5dbfed1432f451d648cd9993f8922198af26a419b89fa2a928b0045b9ccb3f4c063508e0d0ecbc4758094a99b2aeb3
-
SSDEEP
49152:JvX4dktpeMxOWbPC4A97cdP+fMXQaVYa:JvX4K80B7C/MXQ
Static task
static1
Behavioral task
behavioral1
Sample
4857eea4cdb38f5a705744faa7a99a13f69cec9f07e2fbdf1fbfc25c32c731a7.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
4857eea4cdb38f5a705744faa7a99a13f69cec9f07e2fbdf1fbfc25c32c731a7
-
Size
2.0MB
-
MD5
95f58f03abe966d7541f2b73f4e6ba6e
-
SHA1
09ccd41084a1560f5dba038378e4b07f9ce62798
-
SHA256
4857eea4cdb38f5a705744faa7a99a13f69cec9f07e2fbdf1fbfc25c32c731a7
-
SHA512
c4914809c91e806262c1352516a76f1fab5dbfed1432f451d648cd9993f8922198af26a419b89fa2a928b0045b9ccb3f4c063508e0d0ecbc4758094a99b2aeb3
-
SSDEEP
49152:JvX4dktpeMxOWbPC4A97cdP+fMXQaVYa:JvX4K80B7C/MXQ
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-