General
-
Target
0c5f3110589cffb218c52261fdb344810c237acc16c468eea51d1ae3ebbc9422N.exe
-
Size
1.7MB
-
Sample
241217-yn56waxmbj
-
MD5
96f592f24441de810c0f25947968e870
-
SHA1
a11e5ae7cc601a01460fcaabf659e99ea0baee7b
-
SHA256
0c5f3110589cffb218c52261fdb344810c237acc16c468eea51d1ae3ebbc9422
-
SHA512
3822049156652b4303cff16301543a6575f07e3c32dcf12796411de5dd16e7ac287c315d1ad4a7feba8b6cc4b322bf8b11b92fbea48b2391738dde898962874a
-
SSDEEP
24576:JQCa84oh1Sw9kEvVdaUWTOP9hsiwjiqcq9LHxTY/Rrti4R5bVM11A+tatgiDfnnw:gs+EGJTOPLaNxlY/m4RDclYtDSMl1wW
Static task
static1
Behavioral task
behavioral1
Sample
0c5f3110589cffb218c52261fdb344810c237acc16c468eea51d1ae3ebbc9422N.exe
Resource
win7-20241023-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
0c5f3110589cffb218c52261fdb344810c237acc16c468eea51d1ae3ebbc9422N.exe
-
Size
1.7MB
-
MD5
96f592f24441de810c0f25947968e870
-
SHA1
a11e5ae7cc601a01460fcaabf659e99ea0baee7b
-
SHA256
0c5f3110589cffb218c52261fdb344810c237acc16c468eea51d1ae3ebbc9422
-
SHA512
3822049156652b4303cff16301543a6575f07e3c32dcf12796411de5dd16e7ac287c315d1ad4a7feba8b6cc4b322bf8b11b92fbea48b2391738dde898962874a
-
SSDEEP
24576:JQCa84oh1Sw9kEvVdaUWTOP9hsiwjiqcq9LHxTY/Rrti4R5bVM11A+tatgiDfnnw:gs+EGJTOPLaNxlY/m4RDclYtDSMl1wW
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-