General
-
Target
15ee29e0c43b3388d79d2202698a751aa77f6226f0f5249d118e6522115a2a18N.exe
-
Size
2.7MB
-
Sample
241221-1x3s8a1nbl
-
MD5
54fda3aeec860324d9e721bf82b9b350
-
SHA1
872ca4ade7427e03993c88062cb5ab0e277a42f5
-
SHA256
15ee29e0c43b3388d79d2202698a751aa77f6226f0f5249d118e6522115a2a18
-
SHA512
759ccde261a42543cd5e829cd3fec876ed14eeb888f1295680201a9640c039ec6423add1e96ad44c84b138f2cd4094e0ebba9a0df0580a5861d972a5cabb7ee1
-
SSDEEP
24576:nLk+07DQLpG+lqM89oNkTf4qdbiw6PF1NP5Z5ksZ+fvy2oSnNvmAQ9SJLWsfNp6r:LWL+lw73QVFbyJoSQ9wL7T65qI+1k
Static task
static1
Behavioral task
behavioral1
Sample
15ee29e0c43b3388d79d2202698a751aa77f6226f0f5249d118e6522115a2a18N.exe
Resource
win7-20240708-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
15ee29e0c43b3388d79d2202698a751aa77f6226f0f5249d118e6522115a2a18N.exe
-
Size
2.7MB
-
MD5
54fda3aeec860324d9e721bf82b9b350
-
SHA1
872ca4ade7427e03993c88062cb5ab0e277a42f5
-
SHA256
15ee29e0c43b3388d79d2202698a751aa77f6226f0f5249d118e6522115a2a18
-
SHA512
759ccde261a42543cd5e829cd3fec876ed14eeb888f1295680201a9640c039ec6423add1e96ad44c84b138f2cd4094e0ebba9a0df0580a5861d972a5cabb7ee1
-
SSDEEP
24576:nLk+07DQLpG+lqM89oNkTf4qdbiw6PF1NP5Z5ksZ+fvy2oSnNvmAQ9SJLWsfNp6r:LWL+lw73QVFbyJoSQ9wL7T65qI+1k
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-