General
-
Target
ac58e9eaf21037b02fda46678d5af12713db0306531b9b282d77cac16b9f3e18
-
Size
1.7MB
-
Sample
241122-zvhjtsypd1
-
MD5
453c59afd11e10b0094658aa65b9659b
-
SHA1
89083fded0b001e296e5a9c8447a5552a55e0065
-
SHA256
ac58e9eaf21037b02fda46678d5af12713db0306531b9b282d77cac16b9f3e18
-
SHA512
f1ed0f85497b82e5429c2a0c224cff479488556deefb7e8074d77d3d669ae978aeba668e9feaf5f13fdcfccace844ab2bd6ea2838775f13d954122319b2c048b
-
SSDEEP
24576:ojbkK0RLYofX1IirjhZkrhKfp5AKA/osc3Ye5oVxhJkzlo/HrLaKJp4:ojunfX5jhMEfvbsc3Y3DkGzL
Static task
static1
Behavioral task
behavioral1
Sample
ac58e9eaf21037b02fda46678d5af12713db0306531b9b282d77cac16b9f3e18.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
ac58e9eaf21037b02fda46678d5af12713db0306531b9b282d77cac16b9f3e18
-
Size
1.7MB
-
MD5
453c59afd11e10b0094658aa65b9659b
-
SHA1
89083fded0b001e296e5a9c8447a5552a55e0065
-
SHA256
ac58e9eaf21037b02fda46678d5af12713db0306531b9b282d77cac16b9f3e18
-
SHA512
f1ed0f85497b82e5429c2a0c224cff479488556deefb7e8074d77d3d669ae978aeba668e9feaf5f13fdcfccace844ab2bd6ea2838775f13d954122319b2c048b
-
SSDEEP
24576:ojbkK0RLYofX1IirjhZkrhKfp5AKA/osc3Ye5oVxhJkzlo/HrLaKJp4:ojunfX5jhMEfvbsc3Y3DkGzL
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-