General
-
Target
538fe15790284eaed6d935abb858f086c48ad10180ac63cad7436d4f5a6420ce
-
Size
5.0MB
-
Sample
241227-aekltawlaq
-
MD5
5f0ad52dcdb06d74463a7cbc32976310
-
SHA1
24a8946ede61392b85c5dd902ddc767958b0be8b
-
SHA256
538fe15790284eaed6d935abb858f086c48ad10180ac63cad7436d4f5a6420ce
-
SHA512
996bde0dea9adf7fd0661e129243904d89bae4c6cf6c7ac584305ef3c81475ab406331c60c2803777e3eb7add40a1962fe36c3bf0fb54c4b1f0bf5379fdb4cd5
-
SSDEEP
49152:0Qvc9zT+VhHKNI/Qy5ocfzl3VFboyJPuYbUaR5tc3k:02QzT+VhHKNI/Qy5ocfzFoEZbUaRQ
Static task
static1
Behavioral task
behavioral1
Sample
538fe15790284eaed6d935abb858f086c48ad10180ac63cad7436d4f5a6420ce.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
538fe15790284eaed6d935abb858f086c48ad10180ac63cad7436d4f5a6420ce
-
Size
5.0MB
-
MD5
5f0ad52dcdb06d74463a7cbc32976310
-
SHA1
24a8946ede61392b85c5dd902ddc767958b0be8b
-
SHA256
538fe15790284eaed6d935abb858f086c48ad10180ac63cad7436d4f5a6420ce
-
SHA512
996bde0dea9adf7fd0661e129243904d89bae4c6cf6c7ac584305ef3c81475ab406331c60c2803777e3eb7add40a1962fe36c3bf0fb54c4b1f0bf5379fdb4cd5
-
SSDEEP
49152:0Qvc9zT+VhHKNI/Qy5ocfzl3VFboyJPuYbUaR5tc3k:02QzT+VhHKNI/Qy5ocfzFoEZbUaRQ
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-