General
-
Target
file.exe
-
Size
1.7MB
-
Sample
241124-pt2k7swmfr
-
MD5
5ef73b409c0a81b7d80cce15a2e83ad9
-
SHA1
6ddd5bf03db3c5402469a7f3f443f27f2566ba3b
-
SHA256
005bb039d2c317340f5e0d3177d85559ccb63c3a722058833d824635069c4c4a
-
SHA512
188948d037cb8e875ef35d07783dfb485e8a88d2d5e3ceda4cb38d1ee2a7e37a21b5036faad12fb3a63cb10667b0c0caa2d0b04d2a5de25a0fc38ce05ee73a79
-
SSDEEP
24576:2y8p41cCNb6lw0TEGTZ7rAP7GzOEzlYXeEUA/sCoLkxcln5rwrl3chMd8sNq9YX8:2Q1cI64GTZ7cTGznBaeBaxU5Gci1fiP
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
file.exe
-
Size
1.7MB
-
MD5
5ef73b409c0a81b7d80cce15a2e83ad9
-
SHA1
6ddd5bf03db3c5402469a7f3f443f27f2566ba3b
-
SHA256
005bb039d2c317340f5e0d3177d85559ccb63c3a722058833d824635069c4c4a
-
SHA512
188948d037cb8e875ef35d07783dfb485e8a88d2d5e3ceda4cb38d1ee2a7e37a21b5036faad12fb3a63cb10667b0c0caa2d0b04d2a5de25a0fc38ce05ee73a79
-
SSDEEP
24576:2y8p41cCNb6lw0TEGTZ7rAP7GzOEzlYXeEUA/sCoLkxcln5rwrl3chMd8sNq9YX8:2Q1cI64GTZ7cTGznBaeBaxU5Gci1fiP
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-