General
-
Target
file.exe
-
Size
1.7MB
-
Sample
241124-cgppnavjgj
-
MD5
3feea8ff886f1fc0d57da4a2b3a109ba
-
SHA1
78d6302f4f09726b6a129c5fcc7cd94a474cc53a
-
SHA256
143e6525646d5d95639eb77420a54205cb02fb8624c6e1662b7460f58b03523f
-
SHA512
e5c107f29e9b2c58365df6e7cb3d7c38534e931147c92ade485f949751712ae63a375608b9cacb178593f5b25b58ebb5980b8abef3df459ea6e15d2b6f709e32
-
SSDEEP
49152:SY1ySnSCeX+CHrw9LBDb4t+oxXLrtXzc:SY11nSPX+aMJb0+o93e
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
file.exe
-
Size
1.7MB
-
MD5
3feea8ff886f1fc0d57da4a2b3a109ba
-
SHA1
78d6302f4f09726b6a129c5fcc7cd94a474cc53a
-
SHA256
143e6525646d5d95639eb77420a54205cb02fb8624c6e1662b7460f58b03523f
-
SHA512
e5c107f29e9b2c58365df6e7cb3d7c38534e931147c92ade485f949751712ae63a375608b9cacb178593f5b25b58ebb5980b8abef3df459ea6e15d2b6f709e32
-
SSDEEP
49152:SY1ySnSCeX+CHrw9LBDb4t+oxXLrtXzc:SY11nSPX+aMJb0+o93e
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-