General
-
Target
7995929ff7396fb33763d9b55a644935027a30900077cfac3cee46839cdd6edb
-
Size
1.7MB
-
Sample
241119-kx68mssph1
-
MD5
f4d0de92c73d33724e81bb4abcf9f1ec
-
SHA1
0227c1563bf1f2a11c97edd2a56c16ffc3f3f121
-
SHA256
7995929ff7396fb33763d9b55a644935027a30900077cfac3cee46839cdd6edb
-
SHA512
6155ae3bc2d9eeb1d8cb8341732814a7f394fe63a17b89c90e4cdf8e02a9caf250c1578a735af9c82f06482c45129616b834b8842d64babccad191edea639cc5
-
SSDEEP
49152:2SDefLquNe07B528YAG9vIgauqNbgfJiszF/bWt6xA:RiLqr0108YAYA7XbUNztbTu
Static task
static1
Behavioral task
behavioral1
Sample
7995929ff7396fb33763d9b55a644935027a30900077cfac3cee46839cdd6edb.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
7995929ff7396fb33763d9b55a644935027a30900077cfac3cee46839cdd6edb
-
Size
1.7MB
-
MD5
f4d0de92c73d33724e81bb4abcf9f1ec
-
SHA1
0227c1563bf1f2a11c97edd2a56c16ffc3f3f121
-
SHA256
7995929ff7396fb33763d9b55a644935027a30900077cfac3cee46839cdd6edb
-
SHA512
6155ae3bc2d9eeb1d8cb8341732814a7f394fe63a17b89c90e4cdf8e02a9caf250c1578a735af9c82f06482c45129616b834b8842d64babccad191edea639cc5
-
SSDEEP
49152:2SDefLquNe07B528YAG9vIgauqNbgfJiszF/bWt6xA:RiLqr0108YAYA7XbUNztbTu
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-