General
-
Target
fb110b1db7c02725d6cb0953cf153a2b5e158d358db136aece90ac06d79cb07d.exe
-
Size
2.5MB
-
Sample
250124-gqdqzatlay
-
MD5
23b163180bc13aa5f430c2cf0413da12
-
SHA1
c03af31d714b26d2bf254dd986208f20b37885dd
-
SHA256
fb110b1db7c02725d6cb0953cf153a2b5e158d358db136aece90ac06d79cb07d
-
SHA512
598fdd55f492a164c7b669e777d73a0e17b5db0e34d484cae591743699d524b794a6794db9cc0616ccc2412cc9557fa12d8c3780dbf62b8635db76698bbbd77b
-
SSDEEP
49152:1XaijDDioKqQCOlNBSVPtiCdCLBHkJ2MHjFVWquPgmNW5klRBIdltPAFEP:nDHKRstiCdGHHIjFVWhjNW5uQo6P
Behavioral task
behavioral1
Sample
fb110b1db7c02725d6cb0953cf153a2b5e158d358db136aece90ac06d79cb07d.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
http://stair585.com
Targets
-
-
Target
fb110b1db7c02725d6cb0953cf153a2b5e158d358db136aece90ac06d79cb07d.exe
-
Size
2.5MB
-
MD5
23b163180bc13aa5f430c2cf0413da12
-
SHA1
c03af31d714b26d2bf254dd986208f20b37885dd
-
SHA256
fb110b1db7c02725d6cb0953cf153a2b5e158d358db136aece90ac06d79cb07d
-
SHA512
598fdd55f492a164c7b669e777d73a0e17b5db0e34d484cae591743699d524b794a6794db9cc0616ccc2412cc9557fa12d8c3780dbf62b8635db76698bbbd77b
-
SSDEEP
49152:1XaijDDioKqQCOlNBSVPtiCdCLBHkJ2MHjFVWquPgmNW5klRBIdltPAFEP:nDHKRstiCdGHHIjFVWhjNW5uQo6P
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-