General
-
Target
c2e1647a27c7ef8dff592d7cc1611828d7020097ce7eecb6c4cc7ca9ab8f36b2
-
Size
5.0MB
-
Sample
241226-zacg3symdw
-
MD5
a7f7ab07b8e0883146876349af33e9bf
-
SHA1
fcf2c651b552472bd92e47f6664ef9077ef4b6cc
-
SHA256
c2e1647a27c7ef8dff592d7cc1611828d7020097ce7eecb6c4cc7ca9ab8f36b2
-
SHA512
0d1b44e08ccd97975978bbcca90c5e922e62001b3febcd560ff39100454531333bacec6555e082b90931e787054038943c031b92bf05d0b45551cedcad6d04da
-
SSDEEP
49152:eP9MZg7VzYZX7ArNiFSbv03arrdmyXNX2lpO+7YoQN:8Yqa17ARiFSQarxrdXcOltN
Static task
static1
Behavioral task
behavioral1
Sample
c2e1647a27c7ef8dff592d7cc1611828d7020097ce7eecb6c4cc7ca9ab8f36b2.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
c2e1647a27c7ef8dff592d7cc1611828d7020097ce7eecb6c4cc7ca9ab8f36b2
-
Size
5.0MB
-
MD5
a7f7ab07b8e0883146876349af33e9bf
-
SHA1
fcf2c651b552472bd92e47f6664ef9077ef4b6cc
-
SHA256
c2e1647a27c7ef8dff592d7cc1611828d7020097ce7eecb6c4cc7ca9ab8f36b2
-
SHA512
0d1b44e08ccd97975978bbcca90c5e922e62001b3febcd560ff39100454531333bacec6555e082b90931e787054038943c031b92bf05d0b45551cedcad6d04da
-
SSDEEP
49152:eP9MZg7VzYZX7ArNiFSbv03arrdmyXNX2lpO+7YoQN:8Yqa17ARiFSQarxrdXcOltN
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-