General
-
Target
EaseUSDataRecoveryWizardActivator.exe
-
Size
2.4MB
-
Sample
250109-xdnneazkdr
-
MD5
5b6a5176c441f4241780d4d3dede7b65
-
SHA1
02c1d8cc96e2898510737e48f573214355d96c7e
-
SHA256
9d385acb88418f0b5e28ac0ff023700355d29841efb02e67c47ce96882a87f11
-
SHA512
2a91d5a83011a739853d6617b50a2354945ea0d59f7679feee088fd6e007448bb423266cedb51efb92203bc39203cb8091d33d95b03fcaf42dc571e9cdb53a00
-
SSDEEP
49152:MDkUrkydBe7+nHcKlc2mZb5hOQYzpsc9FAXiBlYQQCXizyjW9NUKW+SGf5s8ZPn:M4UF8KlJm15h+lz9qmlY0iuy/7WlGfWO
Static task
static1
Behavioral task
behavioral1
Sample
EaseUSDataRecoveryWizardActivator.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
default
http://212.118.37.224
-
url_path
/bad9416e2db99d17.php
Targets
-
-
Target
EaseUSDataRecoveryWizardActivator.exe
-
Size
2.4MB
-
MD5
5b6a5176c441f4241780d4d3dede7b65
-
SHA1
02c1d8cc96e2898510737e48f573214355d96c7e
-
SHA256
9d385acb88418f0b5e28ac0ff023700355d29841efb02e67c47ce96882a87f11
-
SHA512
2a91d5a83011a739853d6617b50a2354945ea0d59f7679feee088fd6e007448bb423266cedb51efb92203bc39203cb8091d33d95b03fcaf42dc571e9cdb53a00
-
SSDEEP
49152:MDkUrkydBe7+nHcKlc2mZb5hOQYzpsc9FAXiBlYQQCXizyjW9NUKW+SGf5s8ZPn:M4UF8KlJm15h+lz9qmlY0iuy/7WlGfWO
-
Detects Stealc stealer
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-