General
-
Target
bbe59338533d1e313bd878a3507fdbfe04e7b187d07f154c73c5bfe9c54bf260
-
Size
1.7MB
-
Sample
250109-xn435szmhq
-
MD5
ce7750d50c56a9cb1e863c7f90cf0030
-
SHA1
2127ed24bdc4bc37950941376cb25d4b72abaad6
-
SHA256
bbe59338533d1e313bd878a3507fdbfe04e7b187d07f154c73c5bfe9c54bf260
-
SHA512
578d9c7063515ba148a9046376a5c18795814c3b729baa72eb4aead14d1f374d8ca5e07a5c0783adfd1d3ac7a96d901c2600cf418ad024708599b74b6f0fce91
-
SSDEEP
24576:p1Oihl9F65Hoji3BaJWg995vIBtnzsWnsOhxxc+X1CQmXATwSgjdElsoA:p1O2565H8i3Baz93OtnSGo+B04lso
Static task
static1
Behavioral task
behavioral1
Sample
bbe59338533d1e313bd878a3507fdbfe04e7b187d07f154c73c5bfe9c54bf260.exe
Resource
win7-20241023-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
bbe59338533d1e313bd878a3507fdbfe04e7b187d07f154c73c5bfe9c54bf260
-
Size
1.7MB
-
MD5
ce7750d50c56a9cb1e863c7f90cf0030
-
SHA1
2127ed24bdc4bc37950941376cb25d4b72abaad6
-
SHA256
bbe59338533d1e313bd878a3507fdbfe04e7b187d07f154c73c5bfe9c54bf260
-
SHA512
578d9c7063515ba148a9046376a5c18795814c3b729baa72eb4aead14d1f374d8ca5e07a5c0783adfd1d3ac7a96d901c2600cf418ad024708599b74b6f0fce91
-
SSDEEP
24576:p1Oihl9F65Hoji3BaJWg995vIBtnzsWnsOhxxc+X1CQmXATwSgjdElsoA:p1O2565H8i3Baz93OtnSGo+B04lso
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-