General
-
Target
a782058a0f3fe32eddc56aa22a302f5c1d7f718e434cf2c547336ace69a680e2
-
Size
1.7MB
-
Sample
241122-wd45qa1lak
-
MD5
3b43c7942554833f316cf7108b571f8b
-
SHA1
f6f15b0a739eac16980144cbc1b7e2579fe9141a
-
SHA256
a782058a0f3fe32eddc56aa22a302f5c1d7f718e434cf2c547336ace69a680e2
-
SHA512
f12e5b6a73c6c75a1641b31446aac4111d1326b6186f9b3a70b4527256f6f4a9325382daedd89524afc2f4137536a8e6350849a18a9da769ddb834e85c7b0226
-
SSDEEP
49152:CCRt5JhpnWwiPQ1+xLwj6oNWuJ/syBrFXVz:dRvJh1tiPs+xEJF5Brb
Static task
static1
Behavioral task
behavioral1
Sample
a782058a0f3fe32eddc56aa22a302f5c1d7f718e434cf2c547336ace69a680e2.exe
Resource
win7-20241023-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
a782058a0f3fe32eddc56aa22a302f5c1d7f718e434cf2c547336ace69a680e2
-
Size
1.7MB
-
MD5
3b43c7942554833f316cf7108b571f8b
-
SHA1
f6f15b0a739eac16980144cbc1b7e2579fe9141a
-
SHA256
a782058a0f3fe32eddc56aa22a302f5c1d7f718e434cf2c547336ace69a680e2
-
SHA512
f12e5b6a73c6c75a1641b31446aac4111d1326b6186f9b3a70b4527256f6f4a9325382daedd89524afc2f4137536a8e6350849a18a9da769ddb834e85c7b0226
-
SSDEEP
49152:CCRt5JhpnWwiPQ1+xLwj6oNWuJ/syBrFXVz:dRvJh1tiPs+xEJF5Brb
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-