General
-
Target
0911c94ce0979522999ab8e796c4e5a3db35cdab27dfd208902c24f77556a967
-
Size
5.0MB
-
Sample
241226-y12zzsxrfz
-
MD5
1cd88ba6c43ec0f578f261746327cc9c
-
SHA1
d2c1d38a835fdfc81be5739ae5b863a663118346
-
SHA256
0911c94ce0979522999ab8e796c4e5a3db35cdab27dfd208902c24f77556a967
-
SHA512
1b64ec2e8f48a6486836e5eeba530973317d3f468c3ae00f43b06c0254e9d200c8504d9ac2f17b8220d8fa5b1496bb934f9c950e2616f85fbf7a82192f014ec0
-
SSDEEP
98304:X8nLpn2Y/JerNUDz7zuLRSF20AUSU7S3T24:snLp2lRSk0AUtw
Static task
static1
Behavioral task
behavioral1
Sample
0911c94ce0979522999ab8e796c4e5a3db35cdab27dfd208902c24f77556a967.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
0911c94ce0979522999ab8e796c4e5a3db35cdab27dfd208902c24f77556a967
-
Size
5.0MB
-
MD5
1cd88ba6c43ec0f578f261746327cc9c
-
SHA1
d2c1d38a835fdfc81be5739ae5b863a663118346
-
SHA256
0911c94ce0979522999ab8e796c4e5a3db35cdab27dfd208902c24f77556a967
-
SHA512
1b64ec2e8f48a6486836e5eeba530973317d3f468c3ae00f43b06c0254e9d200c8504d9ac2f17b8220d8fa5b1496bb934f9c950e2616f85fbf7a82192f014ec0
-
SSDEEP
98304:X8nLpn2Y/JerNUDz7zuLRSF20AUSU7S3T24:snLp2lRSk0AUtw
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-