General
-
Target
787c4df8819b4b4b4bfb0125c2eb646b53044d63767e7a559ccae0ff0c23ecbb
-
Size
1.7MB
-
Sample
250125-3k6epatqbs
-
MD5
f58c08aad076c7a8d3fa2a7d0a92c85e
-
SHA1
e72b702775e1d0ea6a3f6ce353e171ebb8cb7104
-
SHA256
787c4df8819b4b4b4bfb0125c2eb646b53044d63767e7a559ccae0ff0c23ecbb
-
SHA512
f9217d0c95e6c54c6d980181537a0ec823fe0d4cb30cf0a24f2bd11fd6de30822a3c6c1f9b1f64d558aa0511f6e5f8240848923eaf68fb42ae7110c41b3b32c7
-
SSDEEP
49152:sVcCPFlobRSOt5ERYXIEtopIud31/JPTIK:sVcCPodSVRYYEtoSc1/BN
Static task
static1
Behavioral task
behavioral1
Sample
787c4df8819b4b4b4bfb0125c2eb646b53044d63767e7a559ccae0ff0c23ecbb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
787c4df8819b4b4b4bfb0125c2eb646b53044d63767e7a559ccae0ff0c23ecbb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
787c4df8819b4b4b4bfb0125c2eb646b53044d63767e7a559ccae0ff0c23ecbb
-
Size
1.7MB
-
MD5
f58c08aad076c7a8d3fa2a7d0a92c85e
-
SHA1
e72b702775e1d0ea6a3f6ce353e171ebb8cb7104
-
SHA256
787c4df8819b4b4b4bfb0125c2eb646b53044d63767e7a559ccae0ff0c23ecbb
-
SHA512
f9217d0c95e6c54c6d980181537a0ec823fe0d4cb30cf0a24f2bd11fd6de30822a3c6c1f9b1f64d558aa0511f6e5f8240848923eaf68fb42ae7110c41b3b32c7
-
SSDEEP
49152:sVcCPFlobRSOt5ERYXIEtopIud31/JPTIK:sVcCPodSVRYYEtoSc1/BN
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-