General
-
Target
file
-
Size
1.7MB
-
Sample
241213-fccq3szqhj
-
MD5
243981bf7518e34e3fa82c779c303bbc
-
SHA1
f67d4b8c4bef6b2a174b66f60415eb60e85c680c
-
SHA256
e4be04959999d79537ceae6a6113614c5da67d73c99714a1aa7ce81503a249a7
-
SHA512
a3c5a0dfc1f9b14e5a4744b6a811c473f0ed3fe08643c73c116a2050a0ba7b2bef8b0a0034356c5b5611c5a4d7c14df12b7ec0f1acb0981e09939987e5c25be8
-
SSDEEP
49152:zxMOQa/059DtVpDnTcdK034R5/Lm40q++HwTTQQEARb:z6pK059xj4Y03o5Dm4y+HQE2
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
file
-
Size
1.7MB
-
MD5
243981bf7518e34e3fa82c779c303bbc
-
SHA1
f67d4b8c4bef6b2a174b66f60415eb60e85c680c
-
SHA256
e4be04959999d79537ceae6a6113614c5da67d73c99714a1aa7ce81503a249a7
-
SHA512
a3c5a0dfc1f9b14e5a4744b6a811c473f0ed3fe08643c73c116a2050a0ba7b2bef8b0a0034356c5b5611c5a4d7c14df12b7ec0f1acb0981e09939987e5c25be8
-
SSDEEP
49152:zxMOQa/059DtVpDnTcdK034R5/Lm40q++HwTTQQEARb:z6pK059xj4Y03o5Dm4y+HQE2
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-