General
-
Target
708e04b3f2d37c3cb32b2f88962676ba939525b124a757236ea3174b5b2eee74N.exe
-
Size
2.8MB
-
Sample
241222-ay6cmawncm
-
MD5
37bc9fc38023802a67c6b8902a8bd890
-
SHA1
a31726802dece6ee4d91dec9eab23b057bd00efe
-
SHA256
708e04b3f2d37c3cb32b2f88962676ba939525b124a757236ea3174b5b2eee74
-
SHA512
6443fe14f8e0b75d124c5fd070870bced30f339e4718c7ec2fa875284ef7e0d46945ba17a32517b13f4e814a33cdafeabcd114b579311c20e4b374243bf2fdc5
-
SSDEEP
49152:Kagm/5gx3bOQpjZpaoiK1Vyz8HoKE8RzulwuY+D:KagmRgxawj6oiKdPZdulwuY+D
Static task
static1
Behavioral task
behavioral1
Sample
708e04b3f2d37c3cb32b2f88962676ba939525b124a757236ea3174b5b2eee74N.exe
Resource
win7-20241023-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
708e04b3f2d37c3cb32b2f88962676ba939525b124a757236ea3174b5b2eee74N.exe
-
Size
2.8MB
-
MD5
37bc9fc38023802a67c6b8902a8bd890
-
SHA1
a31726802dece6ee4d91dec9eab23b057bd00efe
-
SHA256
708e04b3f2d37c3cb32b2f88962676ba939525b124a757236ea3174b5b2eee74
-
SHA512
6443fe14f8e0b75d124c5fd070870bced30f339e4718c7ec2fa875284ef7e0d46945ba17a32517b13f4e814a33cdafeabcd114b579311c20e4b374243bf2fdc5
-
SSDEEP
49152:Kagm/5gx3bOQpjZpaoiK1Vyz8HoKE8RzulwuY+D:KagmRgxawj6oiKdPZdulwuY+D
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-