General
-
Target
6b96c3ee336b7257c712ddbb4664b56a750b92b5c4b1d5f7484bb61ba8df8ba3
-
Size
1.7MB
-
Sample
250107-n6sndsskdn
-
MD5
d71fc3d5fefeec37bf5dbf2fe3df17b0
-
SHA1
73741f5718bf8f36c47da2e27b21583756c0eddd
-
SHA256
6b96c3ee336b7257c712ddbb4664b56a750b92b5c4b1d5f7484bb61ba8df8ba3
-
SHA512
9ebfe9bf1e6d53a5d130916a5fe9cfa4b73d5afbf84c525a1430902f5ed4fa2d9b02a120312d766a3bb2d9a6501bd0eca1b254c77844916a04f69da34ede7c78
-
SSDEEP
49152:TLV7By6YkFT2HIT5215KTuq9U8eEPSfZPWz0F7+B7iGWOGOVW1:Tq670a5GMl9UlESPWYFSoMGd
Static task
static1
Behavioral task
behavioral1
Sample
6b96c3ee336b7257c712ddbb4664b56a750b92b5c4b1d5f7484bb61ba8df8ba3.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
6b96c3ee336b7257c712ddbb4664b56a750b92b5c4b1d5f7484bb61ba8df8ba3
-
Size
1.7MB
-
MD5
d71fc3d5fefeec37bf5dbf2fe3df17b0
-
SHA1
73741f5718bf8f36c47da2e27b21583756c0eddd
-
SHA256
6b96c3ee336b7257c712ddbb4664b56a750b92b5c4b1d5f7484bb61ba8df8ba3
-
SHA512
9ebfe9bf1e6d53a5d130916a5fe9cfa4b73d5afbf84c525a1430902f5ed4fa2d9b02a120312d766a3bb2d9a6501bd0eca1b254c77844916a04f69da34ede7c78
-
SSDEEP
49152:TLV7By6YkFT2HIT5215KTuq9U8eEPSfZPWz0F7+B7iGWOGOVW1:Tq670a5GMl9UlESPWYFSoMGd
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-