General
-
Target
7ef6137bbfca134b6862db2ae7839ddd5b719e3c993128d62c583945d889cc18
-
Size
4.9MB
-
Sample
241226-2y6ryatrel
-
MD5
0d3c68e3a36ec0ad7efa120a851b20b6
-
SHA1
fde9d96c268481e58146a8aac0003465c751bdf3
-
SHA256
7ef6137bbfca134b6862db2ae7839ddd5b719e3c993128d62c583945d889cc18
-
SHA512
7af5a4e2296224e670dbed1e2c3355da0830951b2cbdf5be41b9038888f8ad9d4d0f559f64aa3606f776a4ad46ead06ae6c93d971ecbd1996a203ed23dfdcff9
-
SSDEEP
49152:l9WkkKsI+h3cQmFRDL1F9waFQQCwjIqTN1TUSl:lAkkKsrcQm/n/WSQfwjIqjUU
Static task
static1
Behavioral task
behavioral1
Sample
7ef6137bbfca134b6862db2ae7839ddd5b719e3c993128d62c583945d889cc18.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
7ef6137bbfca134b6862db2ae7839ddd5b719e3c993128d62c583945d889cc18
-
Size
4.9MB
-
MD5
0d3c68e3a36ec0ad7efa120a851b20b6
-
SHA1
fde9d96c268481e58146a8aac0003465c751bdf3
-
SHA256
7ef6137bbfca134b6862db2ae7839ddd5b719e3c993128d62c583945d889cc18
-
SHA512
7af5a4e2296224e670dbed1e2c3355da0830951b2cbdf5be41b9038888f8ad9d4d0f559f64aa3606f776a4ad46ead06ae6c93d971ecbd1996a203ed23dfdcff9
-
SSDEEP
49152:l9WkkKsI+h3cQmFRDL1F9waFQQCwjIqTN1TUSl:lAkkKsrcQm/n/WSQfwjIqjUU
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-