General
-
Target
76c9bceefeb0543ab3b1499826eb5980d20853f4958c178d6d75484b058b4c4c
-
Size
1.7MB
-
Sample
250113-vnpbksznct
-
MD5
e3c1c611abbc52f339176b9842c6f758
-
SHA1
becf4adf856727f2c1a1cb5758e0bbe0245121d4
-
SHA256
76c9bceefeb0543ab3b1499826eb5980d20853f4958c178d6d75484b058b4c4c
-
SHA512
20bc3a862bf1de950f96cc04164a948451ba255ab64c1cb5009823f8f4ab3a2129081a9df4ffddb700d6bff1c4573eccacb0a15a75c7112dd47facbb53ff11d2
-
SSDEEP
49152:vcRCEEsVhWP0pG2Pw+BPkaJ8G+3oUudGFAU:0RqBJ24mPPJk3oUfAU
Static task
static1
Behavioral task
behavioral1
Sample
76c9bceefeb0543ab3b1499826eb5980d20853f4958c178d6d75484b058b4c4c.exe
Resource
win7-20241010-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
76c9bceefeb0543ab3b1499826eb5980d20853f4958c178d6d75484b058b4c4c
-
Size
1.7MB
-
MD5
e3c1c611abbc52f339176b9842c6f758
-
SHA1
becf4adf856727f2c1a1cb5758e0bbe0245121d4
-
SHA256
76c9bceefeb0543ab3b1499826eb5980d20853f4958c178d6d75484b058b4c4c
-
SHA512
20bc3a862bf1de950f96cc04164a948451ba255ab64c1cb5009823f8f4ab3a2129081a9df4ffddb700d6bff1c4573eccacb0a15a75c7112dd47facbb53ff11d2
-
SSDEEP
49152:vcRCEEsVhWP0pG2Pw+BPkaJ8G+3oUudGFAU:0RqBJ24mPPJk3oUfAU
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-