General
-
Target
be7b69901eac0a94f38737d2c8ccc635b026cbe29c546100c370517d06fe4cadN.exe
-
Size
1.7MB
-
Sample
250107-zlsnfaznam
-
MD5
9a949898d3ee6b471c675d9ada8ee430
-
SHA1
f6984fdd41a345705cb529ca294b6b3418af5058
-
SHA256
be7b69901eac0a94f38737d2c8ccc635b026cbe29c546100c370517d06fe4cad
-
SHA512
30dfbfb98293dd24ddf82dba62453272d3008dc91e20d6ab89406c150294b1fb304dc9fe61dd42ac35dcae5dd53fe194ba3bf442542ec38188d5e8567dc35770
-
SSDEEP
49152:jlkmFVNSJegkrH17i9Q8WBoXCD5cZEjNC:j2Jegkrs9mBoXDEh
Static task
static1
Behavioral task
behavioral1
Sample
be7b69901eac0a94f38737d2c8ccc635b026cbe29c546100c370517d06fe4cadN.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
be7b69901eac0a94f38737d2c8ccc635b026cbe29c546100c370517d06fe4cadN.exe
-
Size
1.7MB
-
MD5
9a949898d3ee6b471c675d9ada8ee430
-
SHA1
f6984fdd41a345705cb529ca294b6b3418af5058
-
SHA256
be7b69901eac0a94f38737d2c8ccc635b026cbe29c546100c370517d06fe4cad
-
SHA512
30dfbfb98293dd24ddf82dba62453272d3008dc91e20d6ab89406c150294b1fb304dc9fe61dd42ac35dcae5dd53fe194ba3bf442542ec38188d5e8567dc35770
-
SSDEEP
49152:jlkmFVNSJegkrH17i9Q8WBoXCD5cZEjNC:j2Jegkrs9mBoXDEh
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-