General
-
Target
file.exe
-
Size
1.7MB
-
Sample
241121-f2kg8atmdj
-
MD5
3b43c7942554833f316cf7108b571f8b
-
SHA1
f6f15b0a739eac16980144cbc1b7e2579fe9141a
-
SHA256
a782058a0f3fe32eddc56aa22a302f5c1d7f718e434cf2c547336ace69a680e2
-
SHA512
f12e5b6a73c6c75a1641b31446aac4111d1326b6186f9b3a70b4527256f6f4a9325382daedd89524afc2f4137536a8e6350849a18a9da769ddb834e85c7b0226
-
SSDEEP
49152:CCRt5JhpnWwiPQ1+xLwj6oNWuJ/syBrFXVz:dRvJh1tiPs+xEJF5Brb
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
file.exe
-
Size
1.7MB
-
MD5
3b43c7942554833f316cf7108b571f8b
-
SHA1
f6f15b0a739eac16980144cbc1b7e2579fe9141a
-
SHA256
a782058a0f3fe32eddc56aa22a302f5c1d7f718e434cf2c547336ace69a680e2
-
SHA512
f12e5b6a73c6c75a1641b31446aac4111d1326b6186f9b3a70b4527256f6f4a9325382daedd89524afc2f4137536a8e6350849a18a9da769ddb834e85c7b0226
-
SSDEEP
49152:CCRt5JhpnWwiPQ1+xLwj6oNWuJ/syBrFXVz:dRvJh1tiPs+xEJF5Brb
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-