General
-
Target
495523cd7b27c3be087a5c0e77aafaf0aca33bd54ec5168d0ebb341fa9b25f89
-
Size
1.7MB
-
Sample
250125-fyjfraxncx
-
MD5
bf8c133b81c52a501d6e0add51f14791
-
SHA1
b1446a5b9e7532a5029bfa5fc342f29e1823ab35
-
SHA256
495523cd7b27c3be087a5c0e77aafaf0aca33bd54ec5168d0ebb341fa9b25f89
-
SHA512
23077fcb800fa53d1272308e3215c3371cb618048e4425d53ee35cbee580d2bb2f2e380ff4139ec1fdbfc3895a5314c7dbf2723821abb8909617bfa305043837
-
SSDEEP
49152:zr3w/hRjankGerqGU7onLgjarilEx1lheD6j4:zEhlIRes7Mri+DlID68
Static task
static1
Behavioral task
behavioral1
Sample
495523cd7b27c3be087a5c0e77aafaf0aca33bd54ec5168d0ebb341fa9b25f89.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
495523cd7b27c3be087a5c0e77aafaf0aca33bd54ec5168d0ebb341fa9b25f89.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
495523cd7b27c3be087a5c0e77aafaf0aca33bd54ec5168d0ebb341fa9b25f89
-
Size
1.7MB
-
MD5
bf8c133b81c52a501d6e0add51f14791
-
SHA1
b1446a5b9e7532a5029bfa5fc342f29e1823ab35
-
SHA256
495523cd7b27c3be087a5c0e77aafaf0aca33bd54ec5168d0ebb341fa9b25f89
-
SHA512
23077fcb800fa53d1272308e3215c3371cb618048e4425d53ee35cbee580d2bb2f2e380ff4139ec1fdbfc3895a5314c7dbf2723821abb8909617bfa305043837
-
SSDEEP
49152:zr3w/hRjankGerqGU7onLgjarilEx1lheD6j4:zEhlIRes7Mri+DlID68
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-