General
-
Target
517e35b1e95c3abc9096e5cb9821bdd4c494f7d5bb38f5ca96cd4af6712defaeN.exe
-
Size
1.8MB
-
Sample
241226-lc4sfsslcq
-
MD5
c3d1a295a641ab8612d6c668d14ce510
-
SHA1
025b8c1f7c15a8b5f391013db01eeae18a7d14ce
-
SHA256
517e35b1e95c3abc9096e5cb9821bdd4c494f7d5bb38f5ca96cd4af6712defae
-
SHA512
e6dcab22cafa2b5a2e9f99876f640e6a5f3a5eb2b017e7b3dc8cfe7e1858ae2152dfe46ccbaf4b0a0e1586c815060a6ae2bce908653e6472fab8b1e33d3fa925
-
SSDEEP
49152:gpmFGY3ravO5n/dtOJPFfKswi4J+cjYJyR:gpmFGY7llkVQ8CYJ2
Static task
static1
Behavioral task
behavioral1
Sample
517e35b1e95c3abc9096e5cb9821bdd4c494f7d5bb38f5ca96cd4af6712defaeN.exe
Resource
win7-20240729-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
517e35b1e95c3abc9096e5cb9821bdd4c494f7d5bb38f5ca96cd4af6712defaeN.exe
-
Size
1.8MB
-
MD5
c3d1a295a641ab8612d6c668d14ce510
-
SHA1
025b8c1f7c15a8b5f391013db01eeae18a7d14ce
-
SHA256
517e35b1e95c3abc9096e5cb9821bdd4c494f7d5bb38f5ca96cd4af6712defae
-
SHA512
e6dcab22cafa2b5a2e9f99876f640e6a5f3a5eb2b017e7b3dc8cfe7e1858ae2152dfe46ccbaf4b0a0e1586c815060a6ae2bce908653e6472fab8b1e33d3fa925
-
SSDEEP
49152:gpmFGY3ravO5n/dtOJPFfKswi4J+cjYJyR:gpmFGY7llkVQ8CYJ2
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-