General
-
Target
file.exe
-
Size
1.8MB
-
Sample
241122-l4t3bsymct
-
MD5
24e7a125211d4d86a3a630d71620dfab
-
SHA1
d2402f0dcb6e25d7f75854205d70a84b5456f1e3
-
SHA256
dc01883a066d7191cd869f69e68007a4317c5549fd7b4b815a78a21b1ee63da5
-
SHA512
c8339e62b7ae6ad90957ea21b74dc0ebf8801d9190c4738c3ad2e0b9b4273b3bb9e4d49cb201fb60e5fade7e001bd58ccc2590e326a27c35a2b8f46fcb370542
-
SSDEEP
49152:AUQdGqKSbBUHIKq28TigdbzI55P6IvdW/TRmSBbMn:VQdlKoJyuLPITlvdW/gIb
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
file.exe
-
Size
1.8MB
-
MD5
24e7a125211d4d86a3a630d71620dfab
-
SHA1
d2402f0dcb6e25d7f75854205d70a84b5456f1e3
-
SHA256
dc01883a066d7191cd869f69e68007a4317c5549fd7b4b815a78a21b1ee63da5
-
SHA512
c8339e62b7ae6ad90957ea21b74dc0ebf8801d9190c4738c3ad2e0b9b4273b3bb9e4d49cb201fb60e5fade7e001bd58ccc2590e326a27c35a2b8f46fcb370542
-
SSDEEP
49152:AUQdGqKSbBUHIKq28TigdbzI55P6IvdW/TRmSBbMn:VQdlKoJyuLPITlvdW/gIb
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-