General
-
Target
95ccf951de59f57474c9d6736facaa64b457ef28260a5d92dd311e2a77b4c3fa
-
Size
4.9MB
-
Sample
241227-cj1jyayqek
-
MD5
f74c5b4d8418b94004a5ac4fdd332634
-
SHA1
75ec6782eecb9f871af245ffb3368e0700338a21
-
SHA256
95ccf951de59f57474c9d6736facaa64b457ef28260a5d92dd311e2a77b4c3fa
-
SHA512
801af86a86f9cc2760c0066ea85f55e6a725286075d5de088d2faa316e676e76a5b6ec67df93d023952657226f9508e11a7c8ada961f866be9d0ba064664312b
-
SSDEEP
49152:7P6e0WYtsIldD++2F8e5Rfrij2tmz/HB5:7P6UYGAZp2F8lj0mz/h
Static task
static1
Behavioral task
behavioral1
Sample
95ccf951de59f57474c9d6736facaa64b457ef28260a5d92dd311e2a77b4c3fa.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
95ccf951de59f57474c9d6736facaa64b457ef28260a5d92dd311e2a77b4c3fa
-
Size
4.9MB
-
MD5
f74c5b4d8418b94004a5ac4fdd332634
-
SHA1
75ec6782eecb9f871af245ffb3368e0700338a21
-
SHA256
95ccf951de59f57474c9d6736facaa64b457ef28260a5d92dd311e2a77b4c3fa
-
SHA512
801af86a86f9cc2760c0066ea85f55e6a725286075d5de088d2faa316e676e76a5b6ec67df93d023952657226f9508e11a7c8ada961f866be9d0ba064664312b
-
SSDEEP
49152:7P6e0WYtsIldD++2F8e5Rfrij2tmz/HB5:7P6UYGAZp2F8lj0mz/h
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-