General
-
Target
daab6899aa0611fa275a2790d7097de84967e97bfd3878e975d2d50ed3b41da0
-
Size
4.9MB
-
Sample
241226-3lsj8avnhp
-
MD5
7bb5bb0adfd25eed3c9bc8efb804a837
-
SHA1
f6755a4fce640106bc1b70fdb2345674a3d8e22b
-
SHA256
daab6899aa0611fa275a2790d7097de84967e97bfd3878e975d2d50ed3b41da0
-
SHA512
278e40c8717a00505c0823e2f189c173355b55727d4a5d9b10f1f456b330fce6646436ae6f65306e29d484e3949b68acf0e2afcf39e386ace023a8afcf27ddc6
-
SSDEEP
24576:td6YLwXvYmI2jAmdq2emrQw+2MhOB87BiUVn3pcPKdg72/cOgia+RsBZz7Qe/xLI:tfLEAmpUmdOmrR83pcPKdgtSsBZj/
Static task
static1
Behavioral task
behavioral1
Sample
daab6899aa0611fa275a2790d7097de84967e97bfd3878e975d2d50ed3b41da0.exe
Resource
win7-20241010-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
daab6899aa0611fa275a2790d7097de84967e97bfd3878e975d2d50ed3b41da0
-
Size
4.9MB
-
MD5
7bb5bb0adfd25eed3c9bc8efb804a837
-
SHA1
f6755a4fce640106bc1b70fdb2345674a3d8e22b
-
SHA256
daab6899aa0611fa275a2790d7097de84967e97bfd3878e975d2d50ed3b41da0
-
SHA512
278e40c8717a00505c0823e2f189c173355b55727d4a5d9b10f1f456b330fce6646436ae6f65306e29d484e3949b68acf0e2afcf39e386ace023a8afcf27ddc6
-
SSDEEP
24576:td6YLwXvYmI2jAmdq2emrQw+2MhOB87BiUVn3pcPKdg72/cOgia+RsBZz7Qe/xLI:tfLEAmpUmdOmrR83pcPKdgtSsBZj/
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-