General
-
Target
f6b9748417a17234c49842dd3327f0c2bdd840448a2d92e5246fa5c87dd41162
-
Size
1.7MB
-
Sample
241119-nfdfsavmg1
-
MD5
1d1ca9438cb800e982544370f38762f8
-
SHA1
12c7ea625d7af01fea395529f894a821229aeade
-
SHA256
f6b9748417a17234c49842dd3327f0c2bdd840448a2d92e5246fa5c87dd41162
-
SHA512
438651a8f81aff38ad77ebb44519f8907be1196a1ce26624a2b672563485996e26a21f3448b11c3fe9b9946c8eda3d92d8618df3ecd7e1ef790c310964c75bdd
-
SSDEEP
49152:ZubnkRA6mQV2g89P792w7KEjt5NWD/obJN:ZuLkG6NV2T7VvNIQbn
Static task
static1
Behavioral task
behavioral1
Sample
f6b9748417a17234c49842dd3327f0c2bdd840448a2d92e5246fa5c87dd41162.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
f6b9748417a17234c49842dd3327f0c2bdd840448a2d92e5246fa5c87dd41162
-
Size
1.7MB
-
MD5
1d1ca9438cb800e982544370f38762f8
-
SHA1
12c7ea625d7af01fea395529f894a821229aeade
-
SHA256
f6b9748417a17234c49842dd3327f0c2bdd840448a2d92e5246fa5c87dd41162
-
SHA512
438651a8f81aff38ad77ebb44519f8907be1196a1ce26624a2b672563485996e26a21f3448b11c3fe9b9946c8eda3d92d8618df3ecd7e1ef790c310964c75bdd
-
SSDEEP
49152:ZubnkRA6mQV2g89P792w7KEjt5NWD/obJN:ZuLkG6NV2T7VvNIQbn
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-