General
-
Target
file.exe
-
Size
1.7MB
-
Sample
241122-et8z6strbx
-
MD5
fcab8c77edd9c235497e92d29b6c028d
-
SHA1
5bea36fb1edcb3801f5f7d5dacda5d0ffd5ac020
-
SHA256
ece1bbf67dbee347fca668310d9fcf40f8e736d56bc81fb97e5f12f0d08ab3cb
-
SHA512
a322e25357dbc738e8085deee5d1187ca1a411b5781cb878455e7615b2a7e6f77d70c36a768308c382afe614e5c8618c106155a5a6635c265243714215c83601
-
SSDEEP
49152:pOC+TpfvWttDsNO9XY8Cg1EaaNMSs5Hp:StvWtVfuMX5Hp
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
file.exe
-
Size
1.7MB
-
MD5
fcab8c77edd9c235497e92d29b6c028d
-
SHA1
5bea36fb1edcb3801f5f7d5dacda5d0ffd5ac020
-
SHA256
ece1bbf67dbee347fca668310d9fcf40f8e736d56bc81fb97e5f12f0d08ab3cb
-
SHA512
a322e25357dbc738e8085deee5d1187ca1a411b5781cb878455e7615b2a7e6f77d70c36a768308c382afe614e5c8618c106155a5a6635c265243714215c83601
-
SSDEEP
49152:pOC+TpfvWttDsNO9XY8Cg1EaaNMSs5Hp:StvWtVfuMX5Hp
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-