General
-
Target
f6fe2b646fb1854158ab3002206d6a465083cbf87c2d13438227e902b8b83985.exe
-
Size
1.7MB
-
Sample
241120-ka7wnatqdy
-
MD5
76e0ff31319044889a67c862a932e216
-
SHA1
b0d2310668ce75f421ab1cac0ec4cd130cc7e31e
-
SHA256
f6fe2b646fb1854158ab3002206d6a465083cbf87c2d13438227e902b8b83985
-
SHA512
0d35f134bff0c77928bcc6ffbfa8dab48896df052ece767769ced031bf843f2e51cc23a19a0eeb4b9e124a30ad42843cca0463301ffa19beac98357d0a3bcd09
-
SSDEEP
49152:5TaSFKi7a7mCv13APYbS8Gsfc7fV7pgs93d/4saMw:N0iuJmPWSRpLnN/o
Static task
static1
Behavioral task
behavioral1
Sample
f6fe2b646fb1854158ab3002206d6a465083cbf87c2d13438227e902b8b83985.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
f6fe2b646fb1854158ab3002206d6a465083cbf87c2d13438227e902b8b83985.exe
-
Size
1.7MB
-
MD5
76e0ff31319044889a67c862a932e216
-
SHA1
b0d2310668ce75f421ab1cac0ec4cd130cc7e31e
-
SHA256
f6fe2b646fb1854158ab3002206d6a465083cbf87c2d13438227e902b8b83985
-
SHA512
0d35f134bff0c77928bcc6ffbfa8dab48896df052ece767769ced031bf843f2e51cc23a19a0eeb4b9e124a30ad42843cca0463301ffa19beac98357d0a3bcd09
-
SSDEEP
49152:5TaSFKi7a7mCv13APYbS8Gsfc7fV7pgs93d/4saMw:N0iuJmPWSRpLnN/o
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-