General
-
Target
6c13eef11dd3b4010441c012eb80409ae49059bd73bd28b41980cb62ceb7d6dc
-
Size
1.7MB
-
Sample
241212-n2kf8atjdv
-
MD5
ff189e04d87aece68a3d94be0e58800d
-
SHA1
f3e858591cc7aa05a1408f6e41393b29d8f0a8db
-
SHA256
6c13eef11dd3b4010441c012eb80409ae49059bd73bd28b41980cb62ceb7d6dc
-
SHA512
18477a551a51ffe450ab0a4739d7cb8b0b582c97c352ee4cd6dcd38947867467c0381745c56e6dc8fa4272eebd97ababfdef5983aae56839dd4e403b18dd02b0
-
SSDEEP
49152:Zzi/QlN7woqvThwNUT39Gk+uaCx9piOLdu:ZzA5o4hOo/LLQ
Static task
static1
Behavioral task
behavioral1
Sample
6c13eef11dd3b4010441c012eb80409ae49059bd73bd28b41980cb62ceb7d6dc.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
6c13eef11dd3b4010441c012eb80409ae49059bd73bd28b41980cb62ceb7d6dc
-
Size
1.7MB
-
MD5
ff189e04d87aece68a3d94be0e58800d
-
SHA1
f3e858591cc7aa05a1408f6e41393b29d8f0a8db
-
SHA256
6c13eef11dd3b4010441c012eb80409ae49059bd73bd28b41980cb62ceb7d6dc
-
SHA512
18477a551a51ffe450ab0a4739d7cb8b0b582c97c352ee4cd6dcd38947867467c0381745c56e6dc8fa4272eebd97ababfdef5983aae56839dd4e403b18dd02b0
-
SSDEEP
49152:Zzi/QlN7woqvThwNUT39Gk+uaCx9piOLdu:ZzA5o4hOo/LLQ
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-