General
-
Target
2c2be79b1436a951ac0837e50a624fddc1b2c704c4e1f95f9e0279639f726edc
-
Size
2.8MB
-
Sample
241226-n5qgmsvmfs
-
MD5
225ad75097a8a68691f54ca412436016
-
SHA1
ff923efc942d2dcaa09e606670d885a33aca006f
-
SHA256
2c2be79b1436a951ac0837e50a624fddc1b2c704c4e1f95f9e0279639f726edc
-
SHA512
2fdbb1228fcd916856a135c9a863403e643cf470ae342e6091e61804e0ef01f235aad32eed2562644912ef0de78e72fd0d8c5a4812c1a9ac4d25617f979f5999
-
SSDEEP
49152:bKyuErzV1Ja1FKhLCxJGv55SQ7Hq7IFi6TTHaP:+yuErJ1Ja1FKhK651zq7d+Li
Static task
static1
Behavioral task
behavioral1
Sample
2c2be79b1436a951ac0837e50a624fddc1b2c704c4e1f95f9e0279639f726edc.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
2c2be79b1436a951ac0837e50a624fddc1b2c704c4e1f95f9e0279639f726edc
-
Size
2.8MB
-
MD5
225ad75097a8a68691f54ca412436016
-
SHA1
ff923efc942d2dcaa09e606670d885a33aca006f
-
SHA256
2c2be79b1436a951ac0837e50a624fddc1b2c704c4e1f95f9e0279639f726edc
-
SHA512
2fdbb1228fcd916856a135c9a863403e643cf470ae342e6091e61804e0ef01f235aad32eed2562644912ef0de78e72fd0d8c5a4812c1a9ac4d25617f979f5999
-
SSDEEP
49152:bKyuErzV1Ja1FKhLCxJGv55SQ7Hq7IFi6TTHaP:+yuErJ1Ja1FKhK651zq7d+Li
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-