General
-
Target
1adbf12a222894fef2869b84725cf2671311cc73246ca7476a6e0807e46b5ec7
-
Size
4.9MB
-
Sample
241227-m1p5msvjax
-
MD5
b0afc3be5ca9e3209b844f2cf69f0625
-
SHA1
1ed980c5573f8397f73abc0fe9c59d542763d826
-
SHA256
1adbf12a222894fef2869b84725cf2671311cc73246ca7476a6e0807e46b5ec7
-
SHA512
c5980efcd27a04609f4c370e2adc2f64288d30542ade063d57442524b63738833f96c6c860fe5a7c4defae95ccdaab77c9afa52d305eaf00aded3cbc7bc49dec
-
SSDEEP
49152:uvrT7xNhLptuSMGCr5rqAQzyaS2bAMNmnF9IAP:OfNbltuSMGI5rq/7XbjNGfIA
Static task
static1
Behavioral task
behavioral1
Sample
1adbf12a222894fef2869b84725cf2671311cc73246ca7476a6e0807e46b5ec7.exe
Resource
win7-20241010-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
1adbf12a222894fef2869b84725cf2671311cc73246ca7476a6e0807e46b5ec7
-
Size
4.9MB
-
MD5
b0afc3be5ca9e3209b844f2cf69f0625
-
SHA1
1ed980c5573f8397f73abc0fe9c59d542763d826
-
SHA256
1adbf12a222894fef2869b84725cf2671311cc73246ca7476a6e0807e46b5ec7
-
SHA512
c5980efcd27a04609f4c370e2adc2f64288d30542ade063d57442524b63738833f96c6c860fe5a7c4defae95ccdaab77c9afa52d305eaf00aded3cbc7bc49dec
-
SSDEEP
49152:uvrT7xNhLptuSMGCr5rqAQzyaS2bAMNmnF9IAP:OfNbltuSMGI5rq/7XbjNGfIA
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-