General
-
Target
adddb826ff20d2ff9fadf6358bc0dc81b73afb0da11f9370b4e225cab9ab0a91.exe
-
Size
1.8MB
-
Sample
250125-q4dgssxjcm
-
MD5
d9b687c64ec888affae5f27fd35218d5
-
SHA1
61601415587e5b7edb9870adf5b06ad8622278c7
-
SHA256
adddb826ff20d2ff9fadf6358bc0dc81b73afb0da11f9370b4e225cab9ab0a91
-
SHA512
6aa1af69bb0cd8b1cefc4776d65dc24987c488a1c88c3988e6fc927b0b000d8ae7fb23d37d6ee6a7250d9272aee8a5dec8a6591fc40a82c21b83f8f3e885b99f
-
SSDEEP
49152:R5S5vM1OTx7NR4hok44rX5sHw/6Xt+Fp0FQVfA2c4r8F/HB+:+MqNWhok4UXmQ/wtkWFQRcw8FfU
Static task
static1
Behavioral task
behavioral1
Sample
adddb826ff20d2ff9fadf6358bc0dc81b73afb0da11f9370b4e225cab9ab0a91.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
adddb826ff20d2ff9fadf6358bc0dc81b73afb0da11f9370b4e225cab9ab0a91.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
adddb826ff20d2ff9fadf6358bc0dc81b73afb0da11f9370b4e225cab9ab0a91.exe
-
Size
1.8MB
-
MD5
d9b687c64ec888affae5f27fd35218d5
-
SHA1
61601415587e5b7edb9870adf5b06ad8622278c7
-
SHA256
adddb826ff20d2ff9fadf6358bc0dc81b73afb0da11f9370b4e225cab9ab0a91
-
SHA512
6aa1af69bb0cd8b1cefc4776d65dc24987c488a1c88c3988e6fc927b0b000d8ae7fb23d37d6ee6a7250d9272aee8a5dec8a6591fc40a82c21b83f8f3e885b99f
-
SSDEEP
49152:R5S5vM1OTx7NR4hok44rX5sHw/6Xt+Fp0FQVfA2c4r8F/HB+:+MqNWhok4UXmQ/wtkWFQRcw8FfU
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-