General
-
Target
file.exe
-
Size
1.7MB
-
Sample
241124-scea5avldz
-
MD5
aa243ef1bdfdcb20fd32d145b3d27813
-
SHA1
49dbda343ca429d7831aada6a481b2c500c3a589
-
SHA256
669a254bff31d40ec0bdc035455c88d9a28401641daba531f6ee922bdf1b7aac
-
SHA512
7254f6cc2e9d7ceecb2deb83757779611cf145a2aaa924178d80948c4843c5dc4bf4e48b7e8533937f7aebb618f4f975b0a3018962c34c58c8c407a1e1730bd0
-
SSDEEP
24576:fVeX59CQjHJ7UJ3NQS3MH2yUI4niZt626mFUX/TgAts3sqGWfjcSsGK6VlZE:fVemOHsNt3MWyUFiv62A8Cs8qfLcS3h
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
file.exe
-
Size
1.7MB
-
MD5
aa243ef1bdfdcb20fd32d145b3d27813
-
SHA1
49dbda343ca429d7831aada6a481b2c500c3a589
-
SHA256
669a254bff31d40ec0bdc035455c88d9a28401641daba531f6ee922bdf1b7aac
-
SHA512
7254f6cc2e9d7ceecb2deb83757779611cf145a2aaa924178d80948c4843c5dc4bf4e48b7e8533937f7aebb618f4f975b0a3018962c34c58c8c407a1e1730bd0
-
SSDEEP
24576:fVeX59CQjHJ7UJ3NQS3MH2yUI4niZt626mFUX/TgAts3sqGWfjcSsGK6VlZE:fVemOHsNt3MWyUFiv62A8Cs8qfLcS3h
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-