General
-
Target
b98005ba49c3d5ad4576b26f12dd16f4bf860f253f7c9f6e7eabbd0842ef4cd1
-
Size
4.9MB
-
Sample
241227-jzytlstlcn
-
MD5
d43657f2c89c01967280fe9f9e87e10c
-
SHA1
9698fd6cd6aeccd56fcb403e47a222b7a30c5027
-
SHA256
b98005ba49c3d5ad4576b26f12dd16f4bf860f253f7c9f6e7eabbd0842ef4cd1
-
SHA512
b4d720e93a1ba67e08d06c5bedcd5de3d587dae9df29f41afcfaf2608bc87b917b599887fd1ea67ff3c7150abaec023b5e46bb5e4144db952233c063ca3fa29e
-
SSDEEP
49152:0xIjJiylyln4/Q/8H2FGVUQvh9RpkF+Oj4+3+LEFEmAUMVR:OI1iylyln4/88H2FGVUQJ9Anj53GSU
Static task
static1
Behavioral task
behavioral1
Sample
b98005ba49c3d5ad4576b26f12dd16f4bf860f253f7c9f6e7eabbd0842ef4cd1.exe
Resource
win7-20240708-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
b98005ba49c3d5ad4576b26f12dd16f4bf860f253f7c9f6e7eabbd0842ef4cd1
-
Size
4.9MB
-
MD5
d43657f2c89c01967280fe9f9e87e10c
-
SHA1
9698fd6cd6aeccd56fcb403e47a222b7a30c5027
-
SHA256
b98005ba49c3d5ad4576b26f12dd16f4bf860f253f7c9f6e7eabbd0842ef4cd1
-
SHA512
b4d720e93a1ba67e08d06c5bedcd5de3d587dae9df29f41afcfaf2608bc87b917b599887fd1ea67ff3c7150abaec023b5e46bb5e4144db952233c063ca3fa29e
-
SSDEEP
49152:0xIjJiylyln4/Q/8H2FGVUQvh9RpkF+Oj4+3+LEFEmAUMVR:OI1iylyln4/88H2FGVUQJ9Anj53GSU
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-