General
-
Target
9dd239d9aaaf8124c9a1de4d4eaadd43742e90e7664da7251bf2ad6ab2b0f2fd
-
Size
2.8MB
-
Sample
241226-f24wvsxqfl
-
MD5
8ac493709bef2d5d54806dc396b5eb86
-
SHA1
05c3f2642e32d8b5e914461d5a34631c556cd54f
-
SHA256
9dd239d9aaaf8124c9a1de4d4eaadd43742e90e7664da7251bf2ad6ab2b0f2fd
-
SHA512
a2d6329b03584a3d2e27760ebe64ba034dbc5da8395ea4fc9d0250381e8b5362439104235b9e12ce07456a35de3ee528182f2c6619d8cf98dc03c76844224b79
-
SSDEEP
49152:Mai4BWOITj4/+1TpYBkw20OZUpxjBwkG0O5R+f:44BDI++1TpYTvlwkbcR+
Static task
static1
Behavioral task
behavioral1
Sample
9dd239d9aaaf8124c9a1de4d4eaadd43742e90e7664da7251bf2ad6ab2b0f2fd.exe
Resource
win7-20241010-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
9dd239d9aaaf8124c9a1de4d4eaadd43742e90e7664da7251bf2ad6ab2b0f2fd
-
Size
2.8MB
-
MD5
8ac493709bef2d5d54806dc396b5eb86
-
SHA1
05c3f2642e32d8b5e914461d5a34631c556cd54f
-
SHA256
9dd239d9aaaf8124c9a1de4d4eaadd43742e90e7664da7251bf2ad6ab2b0f2fd
-
SHA512
a2d6329b03584a3d2e27760ebe64ba034dbc5da8395ea4fc9d0250381e8b5362439104235b9e12ce07456a35de3ee528182f2c6619d8cf98dc03c76844224b79
-
SSDEEP
49152:Mai4BWOITj4/+1TpYBkw20OZUpxjBwkG0O5R+f:44BDI++1TpYTvlwkbcR+
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-