General
-
Target
36eb3089e093e058468907e08c07d561f83a1128fde7042e403fafcb4192558c
-
Size
2.7MB
-
Sample
241226-e6ebbsxkfk
-
MD5
feec5b745edfa5a3f51e18af6816d3f3
-
SHA1
5d2f798b9a509694edc92e0ae7250c9915c5e594
-
SHA256
36eb3089e093e058468907e08c07d561f83a1128fde7042e403fafcb4192558c
-
SHA512
8e702e13af0af46014121465315fa0b745766aa4579f08ae8cc7afce19705564410361a526af98b3840d3f8d76dea8c22b760755423e45b747da978b65ffe975
-
SSDEEP
24576:NlmwEycnseIVqSWgsbVAb7FJlRSmJYkVqqm4CigrvxS7ZjcSDVudpR7n/9j60qZy:Nlm0clYW5Ze7FIyMqZrotn/UlHAZ09Q
Static task
static1
Behavioral task
behavioral1
Sample
36eb3089e093e058468907e08c07d561f83a1128fde7042e403fafcb4192558c.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
36eb3089e093e058468907e08c07d561f83a1128fde7042e403fafcb4192558c
-
Size
2.7MB
-
MD5
feec5b745edfa5a3f51e18af6816d3f3
-
SHA1
5d2f798b9a509694edc92e0ae7250c9915c5e594
-
SHA256
36eb3089e093e058468907e08c07d561f83a1128fde7042e403fafcb4192558c
-
SHA512
8e702e13af0af46014121465315fa0b745766aa4579f08ae8cc7afce19705564410361a526af98b3840d3f8d76dea8c22b760755423e45b747da978b65ffe975
-
SSDEEP
24576:NlmwEycnseIVqSWgsbVAb7FJlRSmJYkVqqm4CigrvxS7ZjcSDVudpR7n/9j60qZy:Nlm0clYW5Ze7FIyMqZrotn/UlHAZ09Q
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-