General
-
Target
7d189316bb2fc314693f387c5b710fb73768e1c1a8c95cbd80a2ab70291e7c0f
-
Size
2.8MB
-
Sample
241226-p84zwawndq
-
MD5
89154499aa287867465d749c53e53f0b
-
SHA1
0ed3c13a6d4c0c4f968903f94612708d2f2e148c
-
SHA256
7d189316bb2fc314693f387c5b710fb73768e1c1a8c95cbd80a2ab70291e7c0f
-
SHA512
8aba331f85b14e7745c2cf091e71ee461f7cc4bcecd5c015bbe08ead93231bfdbdc5cb8307542edea8cbddd2878fbf3c2fb484d8b5dfa8ac9d70785936606fe6
-
SSDEEP
49152:fxo9tzIxfuXqnhWV0yELx7Ezg0SNgUXB6TeUGxQ:ZMtgfuXqnho0yEgpknB6CUGi
Static task
static1
Behavioral task
behavioral1
Sample
7d189316bb2fc314693f387c5b710fb73768e1c1a8c95cbd80a2ab70291e7c0f.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
7d189316bb2fc314693f387c5b710fb73768e1c1a8c95cbd80a2ab70291e7c0f
-
Size
2.8MB
-
MD5
89154499aa287867465d749c53e53f0b
-
SHA1
0ed3c13a6d4c0c4f968903f94612708d2f2e148c
-
SHA256
7d189316bb2fc314693f387c5b710fb73768e1c1a8c95cbd80a2ab70291e7c0f
-
SHA512
8aba331f85b14e7745c2cf091e71ee461f7cc4bcecd5c015bbe08ead93231bfdbdc5cb8307542edea8cbddd2878fbf3c2fb484d8b5dfa8ac9d70785936606fe6
-
SSDEEP
49152:fxo9tzIxfuXqnhWV0yELx7Ezg0SNgUXB6TeUGxQ:ZMtgfuXqnho0yEgpknB6CUGi
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-