General
-
Target
ec6ef48d0217005076b5f529341bc1655f7d04bb8ee05519ae6a89cb08b72925
-
Size
1.7MB
-
Sample
250124-x41ewstqds
-
MD5
fbb5c17a920526c243870da007413d69
-
SHA1
0f01eefcd42909c7c6177d3ea2a041b4cec630bd
-
SHA256
ec6ef48d0217005076b5f529341bc1655f7d04bb8ee05519ae6a89cb08b72925
-
SHA512
7ed3c278ddf8058880709f69ea5b7176910fc1665ea493deadd6d5d7ac2ad4d685af93d70b544b030d3d1c3845d7b3532fa1db18d7bd237998b9a67df76c2685
-
SSDEEP
49152:csmcpGuLYgOao5oUq5lJqVTlq4/903NXz12S+if:cB2YgOaoHdlqM9O9ZL
Static task
static1
Behavioral task
behavioral1
Sample
ec6ef48d0217005076b5f529341bc1655f7d04bb8ee05519ae6a89cb08b72925.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec6ef48d0217005076b5f529341bc1655f7d04bb8ee05519ae6a89cb08b72925.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
ec6ef48d0217005076b5f529341bc1655f7d04bb8ee05519ae6a89cb08b72925
-
Size
1.7MB
-
MD5
fbb5c17a920526c243870da007413d69
-
SHA1
0f01eefcd42909c7c6177d3ea2a041b4cec630bd
-
SHA256
ec6ef48d0217005076b5f529341bc1655f7d04bb8ee05519ae6a89cb08b72925
-
SHA512
7ed3c278ddf8058880709f69ea5b7176910fc1665ea493deadd6d5d7ac2ad4d685af93d70b544b030d3d1c3845d7b3532fa1db18d7bd237998b9a67df76c2685
-
SSDEEP
49152:csmcpGuLYgOao5oUq5lJqVTlq4/903NXz12S+if:cB2YgOaoHdlqM9O9ZL
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-