General
-
Target
f1d0c85ac082f628f4b93a30e9f1097499fdfb74d0143ccfe4a5a6468ccb3e2b.exe
-
Size
1.7MB
-
Sample
241122-knv41sxpaz
-
MD5
a5fbf4f1976483efb8676ef10287adec
-
SHA1
18e67d1a9e4f8bc36c889925110cc0aadca52038
-
SHA256
f1d0c85ac082f628f4b93a30e9f1097499fdfb74d0143ccfe4a5a6468ccb3e2b
-
SHA512
fcf7fc5e8f798729116c92cccb83f8a1dc9a3dd40a5af13d98d5fd466bec3d6c6bfea3bfd7864a2545eef468591fc631d70050b364e0ea72ee27e4707dca5edb
-
SSDEEP
24576:ojbkK0RLYofX1IirjhZkrhKfp5AKA/osc3Ye5oVxhJkzlo/HrLaKJp47:ojunfX5jhMEfvbsc3Y3DkGzLQ
Static task
static1
Behavioral task
behavioral1
Sample
f1d0c85ac082f628f4b93a30e9f1097499fdfb74d0143ccfe4a5a6468ccb3e2b.exe
Resource
win7-20241010-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
f1d0c85ac082f628f4b93a30e9f1097499fdfb74d0143ccfe4a5a6468ccb3e2b.exe
-
Size
1.7MB
-
MD5
a5fbf4f1976483efb8676ef10287adec
-
SHA1
18e67d1a9e4f8bc36c889925110cc0aadca52038
-
SHA256
f1d0c85ac082f628f4b93a30e9f1097499fdfb74d0143ccfe4a5a6468ccb3e2b
-
SHA512
fcf7fc5e8f798729116c92cccb83f8a1dc9a3dd40a5af13d98d5fd466bec3d6c6bfea3bfd7864a2545eef468591fc631d70050b364e0ea72ee27e4707dca5edb
-
SSDEEP
24576:ojbkK0RLYofX1IirjhZkrhKfp5AKA/osc3Ye5oVxhJkzlo/HrLaKJp47:ojunfX5jhMEfvbsc3Y3DkGzLQ
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-