General
-
Target
LTZMF_file.exe
-
Size
1.7MB
-
Sample
241120-kv65vsvjft
-
MD5
f606993b2d650ae388adda55d42b7e17
-
SHA1
c6c016892a7d17c3c8575c9577f344c886dbbca6
-
SHA256
c16911abc93470f42ddb1714b510d25394238d3b42bc35e4e7a944dd3262690e
-
SHA512
ab757797767fd0d17593ece660fbc6c79092673d69523af5a4a85e9fc74c1196f464801c993ca7b31f3aa14575ff3a7b0f2423fbfa4b64b40a473ee2a5b42d15
-
SSDEEP
49152:s8RemtT6a+RvBAzfnz1aCwPuyKs4tFu+ZxT+CYyQ+A:1Re+T6aypK/zQTes4tFVZxybl
Static task
static1
Behavioral task
behavioral1
Sample
LTZMF_file.exe
Resource
win7-20240729-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
LTZMF_file.exe
-
Size
1.7MB
-
MD5
f606993b2d650ae388adda55d42b7e17
-
SHA1
c6c016892a7d17c3c8575c9577f344c886dbbca6
-
SHA256
c16911abc93470f42ddb1714b510d25394238d3b42bc35e4e7a944dd3262690e
-
SHA512
ab757797767fd0d17593ece660fbc6c79092673d69523af5a4a85e9fc74c1196f464801c993ca7b31f3aa14575ff3a7b0f2423fbfa4b64b40a473ee2a5b42d15
-
SSDEEP
49152:s8RemtT6a+RvBAzfnz1aCwPuyKs4tFu+ZxT+CYyQ+A:1Re+T6aypK/zQTes4tFVZxybl
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-