General
-
Target
3f6b3352787de33b73d5248a1a21575fb674094cd80082665ec9a3894d312aaf.exe
-
Size
1.7MB
-
Sample
241121-e7phpatkem
-
MD5
ed06943d9d911219cd6f78939799044b
-
SHA1
50aa51c40a252a5ba8a387413c469fb110ca13be
-
SHA256
3f6b3352787de33b73d5248a1a21575fb674094cd80082665ec9a3894d312aaf
-
SHA512
2f05d1b8328bf6178dffaa6941106496e1dfd53a8ad793ac236d3aa98f5332c5cc4250552a10f566af563e072bb0e7506007f6aac26bf44bbfab963269500ce2
-
SSDEEP
49152:m3P5g5fza7HUqaBz2o8dSV2cR67bnMpigBT9QSX:IW7aDzy+MIc4PMpigBxr
Static task
static1
Behavioral task
behavioral1
Sample
3f6b3352787de33b73d5248a1a21575fb674094cd80082665ec9a3894d312aaf.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
3f6b3352787de33b73d5248a1a21575fb674094cd80082665ec9a3894d312aaf.exe
-
Size
1.7MB
-
MD5
ed06943d9d911219cd6f78939799044b
-
SHA1
50aa51c40a252a5ba8a387413c469fb110ca13be
-
SHA256
3f6b3352787de33b73d5248a1a21575fb674094cd80082665ec9a3894d312aaf
-
SHA512
2f05d1b8328bf6178dffaa6941106496e1dfd53a8ad793ac236d3aa98f5332c5cc4250552a10f566af563e072bb0e7506007f6aac26bf44bbfab963269500ce2
-
SSDEEP
49152:m3P5g5fza7HUqaBz2o8dSV2cR67bnMpigBT9QSX:IW7aDzy+MIc4PMpigBxr
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-