General
-
Target
a117df022325ff641b44e0d81f794e83d259764a0c82e52edb471a89b3f75370
-
Size
2.0MB
-
Sample
241120-qxnn7axnfz
-
MD5
b2d5f7c5a51b55bfe094dbe2a60da2e3
-
SHA1
ace802a1a1b603e5361c2f3a2b4b5361b3358186
-
SHA256
a117df022325ff641b44e0d81f794e83d259764a0c82e52edb471a89b3f75370
-
SHA512
c57ea51400c2fb4ab89124160c6321bb597534777c873809ba677b6391d11fabf868889088c742159b148b987d500b3f8d76c8b9a9e604b272d6504c5918f580
-
SSDEEP
49152:DfcqjHOH/2vzt7Z7LAGil2KwMFsHD9LKOsFOorhpzMsT:Dfcq7OHevzs2LKOs/rh2sT
Static task
static1
Behavioral task
behavioral1
Sample
a117df022325ff641b44e0d81f794e83d259764a0c82e52edb471a89b3f75370.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Targets
-
-
Target
a117df022325ff641b44e0d81f794e83d259764a0c82e52edb471a89b3f75370
-
Size
2.0MB
-
MD5
b2d5f7c5a51b55bfe094dbe2a60da2e3
-
SHA1
ace802a1a1b603e5361c2f3a2b4b5361b3358186
-
SHA256
a117df022325ff641b44e0d81f794e83d259764a0c82e52edb471a89b3f75370
-
SHA512
c57ea51400c2fb4ab89124160c6321bb597534777c873809ba677b6391d11fabf868889088c742159b148b987d500b3f8d76c8b9a9e604b272d6504c5918f580
-
SSDEEP
49152:DfcqjHOH/2vzt7Z7LAGil2KwMFsHD9LKOsFOorhpzMsT:Dfcq7OHevzs2LKOs/rh2sT
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-