General
-
Target
e8e5a4aacb9e84f0aeba74900363cd98ef26d9f76099912b4cdaf4d431f342fb
-
Size
2.8MB
-
Sample
241226-enn3tawqcp
-
MD5
476f4f355f6be1a19dbc7ec75dc0c9dc
-
SHA1
e2b1d8b4b48f2966ffd93840ebfbbac07ffb6bc8
-
SHA256
e8e5a4aacb9e84f0aeba74900363cd98ef26d9f76099912b4cdaf4d431f342fb
-
SHA512
85c19c68e4d545eb6cfb7241d437e78f1e81f97377452ae5a4aecf41689401549fda5b3a3e90b4dd3f8ed46cb2172d1884ca73777297798ef340eba7f06aa155
-
SSDEEP
24576:2yh5fHv7Doh1eko23LM8e48xB3An7GzMUe5HRHgwINrt7EzAwKnbqcg2h9ZU22vV:nht3ohD3nFUeYFr9iAwKnV/t32L
Static task
static1
Behavioral task
behavioral1
Sample
e8e5a4aacb9e84f0aeba74900363cd98ef26d9f76099912b4cdaf4d431f342fb.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
e8e5a4aacb9e84f0aeba74900363cd98ef26d9f76099912b4cdaf4d431f342fb
-
Size
2.8MB
-
MD5
476f4f355f6be1a19dbc7ec75dc0c9dc
-
SHA1
e2b1d8b4b48f2966ffd93840ebfbbac07ffb6bc8
-
SHA256
e8e5a4aacb9e84f0aeba74900363cd98ef26d9f76099912b4cdaf4d431f342fb
-
SHA512
85c19c68e4d545eb6cfb7241d437e78f1e81f97377452ae5a4aecf41689401549fda5b3a3e90b4dd3f8ed46cb2172d1884ca73777297798ef340eba7f06aa155
-
SSDEEP
24576:2yh5fHv7Doh1eko23LM8e48xB3An7GzMUe5HRHgwINrt7EzAwKnbqcg2h9ZU22vV:nht3ohD3nFUeYFr9iAwKnV/t32L
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-