General
-
Target
504451eddf7c45ab86eb9253a2a669928d27a3e0c6bd9d03564ca6e2370076f4.exe
-
Size
1.7MB
-
Sample
241124-cpp1dsvncq
-
MD5
e64035d85c07c76968207961c636bafd
-
SHA1
042119fffe8ee795bb0d0365ca326dd0adfc775f
-
SHA256
504451eddf7c45ab86eb9253a2a669928d27a3e0c6bd9d03564ca6e2370076f4
-
SHA512
97712f2770bffaae68ff31894961fb8c8a30300d8b706131e83b30f8f73350fbf821d8eaede0ac49f4e5b83d6394fd813c7b1daa70a7cef8402b642d390acdba
-
SSDEEP
49152:rzSKrMtbWWUPPNOktOLuVecLwj5PTdWdeENnSHRJ:rm0RbOLuVlLMRTdWYENSH
Static task
static1
Behavioral task
behavioral1
Sample
504451eddf7c45ab86eb9253a2a669928d27a3e0c6bd9d03564ca6e2370076f4.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
504451eddf7c45ab86eb9253a2a669928d27a3e0c6bd9d03564ca6e2370076f4.exe
-
Size
1.7MB
-
MD5
e64035d85c07c76968207961c636bafd
-
SHA1
042119fffe8ee795bb0d0365ca326dd0adfc775f
-
SHA256
504451eddf7c45ab86eb9253a2a669928d27a3e0c6bd9d03564ca6e2370076f4
-
SHA512
97712f2770bffaae68ff31894961fb8c8a30300d8b706131e83b30f8f73350fbf821d8eaede0ac49f4e5b83d6394fd813c7b1daa70a7cef8402b642d390acdba
-
SSDEEP
49152:rzSKrMtbWWUPPNOktOLuVecLwj5PTdWdeENnSHRJ:rm0RbOLuVlLMRTdWYENSH
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-