General
-
Target
03df2264ac3415631fb4022b3a1b4d8815df67a7f11201299885a88893994bee
-
Size
1.7MB
-
Sample
250123-va1sfsxmdm
-
MD5
a2685914d4fceef590bef1e9c298bad2
-
SHA1
2a5dc8029bb1640a18e280137afeeac7273e7fcf
-
SHA256
03df2264ac3415631fb4022b3a1b4d8815df67a7f11201299885a88893994bee
-
SHA512
d31002c0a68531bf75bbfaf880e218b42a10391dac31c0dc9523903e39c0fea65fe41cffd5226eb036073ac1c87e5f458384639973fb5285cf62d0be42fdf924
-
SSDEEP
24576:QuOhajb6cyjQFYxrWz4KQhl8N6kNAD91JHqOz+rucdFL/yXfyfcB27xnBat9UEQM:rOhBt2QrWOhl84AAJLojL2fIzeiiE
Static task
static1
Behavioral task
behavioral1
Sample
03df2264ac3415631fb4022b3a1b4d8815df67a7f11201299885a88893994bee.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
03df2264ac3415631fb4022b3a1b4d8815df67a7f11201299885a88893994bee.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
03df2264ac3415631fb4022b3a1b4d8815df67a7f11201299885a88893994bee
-
Size
1.7MB
-
MD5
a2685914d4fceef590bef1e9c298bad2
-
SHA1
2a5dc8029bb1640a18e280137afeeac7273e7fcf
-
SHA256
03df2264ac3415631fb4022b3a1b4d8815df67a7f11201299885a88893994bee
-
SHA512
d31002c0a68531bf75bbfaf880e218b42a10391dac31c0dc9523903e39c0fea65fe41cffd5226eb036073ac1c87e5f458384639973fb5285cf62d0be42fdf924
-
SSDEEP
24576:QuOhajb6cyjQFYxrWz4KQhl8N6kNAD91JHqOz+rucdFL/yXfyfcB27xnBat9UEQM:rOhBt2QrWOhl84AAJLojL2fIzeiiE
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-