General
-
Target
2f14187f609759743ee4431a1260de808e46f9a921dd28caa7c219e7567d5df1.exe
-
Size
1.7MB
-
Sample
241120-v9qfrszdpg
-
MD5
6cda4c99930c2bca37160475f9cbdbaa
-
SHA1
64c392addfc745d01aa00bd43d860b14a4af5494
-
SHA256
2f14187f609759743ee4431a1260de808e46f9a921dd28caa7c219e7567d5df1
-
SHA512
eb638c3f3ddd9941805bcbf755a994796e5c67d802a8e9e822e9433170d9e2c14c2f9cba4814df56cd3d4433fd8e0977ea59062a48492c7eafa94a095ee1028d
-
SSDEEP
24576:IbK1O9Vn0uAT5YjrsePX8mbLsZGzQst7OsU/VfNLHxUhkKeq4KdtFuNM:IX9VndyYjrsePMokGzQs7aNLRckxS7FF
Static task
static1
Behavioral task
behavioral1
Sample
2f14187f609759743ee4431a1260de808e46f9a921dd28caa7c219e7567d5df1.exe
Resource
win7-20240729-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
2f14187f609759743ee4431a1260de808e46f9a921dd28caa7c219e7567d5df1.exe
-
Size
1.7MB
-
MD5
6cda4c99930c2bca37160475f9cbdbaa
-
SHA1
64c392addfc745d01aa00bd43d860b14a4af5494
-
SHA256
2f14187f609759743ee4431a1260de808e46f9a921dd28caa7c219e7567d5df1
-
SHA512
eb638c3f3ddd9941805bcbf755a994796e5c67d802a8e9e822e9433170d9e2c14c2f9cba4814df56cd3d4433fd8e0977ea59062a48492c7eafa94a095ee1028d
-
SSDEEP
24576:IbK1O9Vn0uAT5YjrsePX8mbLsZGzQst7OsU/VfNLHxUhkKeq4KdtFuNM:IX9VndyYjrsePMokGzQs7aNLRckxS7FF
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-