General
-
Target
87905bbf5c3decc2dad4fdcb744f445a337df27c3d32a28ae4c048dabe3e8ea6
-
Size
2.7MB
-
Sample
241226-eh8v2awmf1
-
MD5
3410b8b9caad3d3464849510ee9f0bef
-
SHA1
f704a8b0a1aa793383ed685c2ba409fcc7738019
-
SHA256
87905bbf5c3decc2dad4fdcb744f445a337df27c3d32a28ae4c048dabe3e8ea6
-
SHA512
e16a2f8b5d7ef1036c188e70c3ff26d4a5e94bfc5f523732e3454d19fdf0cb2ef0935721df939b79f033b9ed2f1205a91b41b737cdc29af4bf57bcd7c774be01
-
SSDEEP
49152:nYVY5ngODnd1KpLOY5MJihsn+R///Tmlw:YVY5gQnd1KpLDMJi8+9Tml
Static task
static1
Behavioral task
behavioral1
Sample
87905bbf5c3decc2dad4fdcb744f445a337df27c3d32a28ae4c048dabe3e8ea6.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
87905bbf5c3decc2dad4fdcb744f445a337df27c3d32a28ae4c048dabe3e8ea6
-
Size
2.7MB
-
MD5
3410b8b9caad3d3464849510ee9f0bef
-
SHA1
f704a8b0a1aa793383ed685c2ba409fcc7738019
-
SHA256
87905bbf5c3decc2dad4fdcb744f445a337df27c3d32a28ae4c048dabe3e8ea6
-
SHA512
e16a2f8b5d7ef1036c188e70c3ff26d4a5e94bfc5f523732e3454d19fdf0cb2ef0935721df939b79f033b9ed2f1205a91b41b737cdc29af4bf57bcd7c774be01
-
SSDEEP
49152:nYVY5ngODnd1KpLOY5MJihsn+R///Tmlw:YVY5gQnd1KpLDMJi8+9Tml
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-