General
-
Target
file.exe
-
Size
1.7MB
-
Sample
241124-f5eq5sslgp
-
MD5
85c52cefa22a78fcbd9b6fd8ee2d5e50
-
SHA1
f40c5b7bd336b4fb5b187602e68045a091137126
-
SHA256
5323c3c7c0c60e5e69b8b5eeb05dffc8ce3bbeb52335bc5ed51f7179186d7df9
-
SHA512
18cd50049c383dd5731b4fffb32336e6ef456782bc8356e8c24ef2c9e7e54873515f7513ce22b78b173973469356023053e7ee213c481d3b54387c840a7e3c2e
-
SSDEEP
24576:1fm0AvMzGKZGy4TAzsTwt3/EZRcF2bN7LKGRvr2F21WUL0GqgsG+4hNIS0m+UmmU:1fAvMzGAtf4C8bi2bN731WY0G2nS0Sj
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
file.exe
-
Size
1.7MB
-
MD5
85c52cefa22a78fcbd9b6fd8ee2d5e50
-
SHA1
f40c5b7bd336b4fb5b187602e68045a091137126
-
SHA256
5323c3c7c0c60e5e69b8b5eeb05dffc8ce3bbeb52335bc5ed51f7179186d7df9
-
SHA512
18cd50049c383dd5731b4fffb32336e6ef456782bc8356e8c24ef2c9e7e54873515f7513ce22b78b173973469356023053e7ee213c481d3b54387c840a7e3c2e
-
SSDEEP
24576:1fm0AvMzGKZGy4TAzsTwt3/EZRcF2bN7LKGRvr2F21WUL0GqgsG+4hNIS0m+UmmU:1fAvMzGAtf4C8bi2bN731WY0G2nS0Sj
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-