General
-
Target
e2892813c672c9bc92a7ac23b203e9647c617142222d5c5220a6df968b24b499.exe
-
Size
1.7MB
-
Sample
241211-ea8kasvnfv
-
MD5
327c2f24a87f170dbede36cc43a68875
-
SHA1
92df6f7e472f2d99eb14386536c431fdc8883d95
-
SHA256
e2892813c672c9bc92a7ac23b203e9647c617142222d5c5220a6df968b24b499
-
SHA512
4a397be99ec580af10146cac47786ad352f050e9eff3316096839ec1c7337239a721e96277b3515e95a5b9e5a59800b5794db2477d07d3374915f488d5632c3f
-
SSDEEP
49152:qTdO2jsoS1bcJvbqj5lS/AjlyIUfKFh6NPcl/A:eHhS1IJv+yMUfKv6N0y
Static task
static1
Behavioral task
behavioral1
Sample
e2892813c672c9bc92a7ac23b203e9647c617142222d5c5220a6df968b24b499.exe
Resource
win7-20241023-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
e2892813c672c9bc92a7ac23b203e9647c617142222d5c5220a6df968b24b499.exe
-
Size
1.7MB
-
MD5
327c2f24a87f170dbede36cc43a68875
-
SHA1
92df6f7e472f2d99eb14386536c431fdc8883d95
-
SHA256
e2892813c672c9bc92a7ac23b203e9647c617142222d5c5220a6df968b24b499
-
SHA512
4a397be99ec580af10146cac47786ad352f050e9eff3316096839ec1c7337239a721e96277b3515e95a5b9e5a59800b5794db2477d07d3374915f488d5632c3f
-
SSDEEP
49152:qTdO2jsoS1bcJvbqj5lS/AjlyIUfKFh6NPcl/A:eHhS1IJv+yMUfKv6N0y
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-