General
-
Target
f6284bf206a074e322c8b7a8211bbc9312ef82e5f8de021f5efeee1bf825fa7a
-
Size
1.7MB
-
Sample
250125-qrwslsvkdx
-
MD5
cadd3d3e9618bb546c3e23b5bd7c9f97
-
SHA1
8a99a2cdd18bf517f719c981b89d70b65cfb6650
-
SHA256
f6284bf206a074e322c8b7a8211bbc9312ef82e5f8de021f5efeee1bf825fa7a
-
SHA512
10c26e018db102358bbbad09faefc7c358092eded59bb88887896519e7cb4bc5ca94af86f62b407f2532443f454bec46d4d1ecb66d57dfbda7719b52d5818eed
-
SSDEEP
24576:EM7fgaiZEy2LhRnw4Q/SJV/vkP+gDg8fklKWzK7S2GUC9SHicUPWIrgeA/OvvKzI:gTZARnw4foGr47VGN8HZU5gu3aQj
Static task
static1
Behavioral task
behavioral1
Sample
f6284bf206a074e322c8b7a8211bbc9312ef82e5f8de021f5efeee1bf825fa7a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6284bf206a074e322c8b7a8211bbc9312ef82e5f8de021f5efeee1bf825fa7a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
f6284bf206a074e322c8b7a8211bbc9312ef82e5f8de021f5efeee1bf825fa7a
-
Size
1.7MB
-
MD5
cadd3d3e9618bb546c3e23b5bd7c9f97
-
SHA1
8a99a2cdd18bf517f719c981b89d70b65cfb6650
-
SHA256
f6284bf206a074e322c8b7a8211bbc9312ef82e5f8de021f5efeee1bf825fa7a
-
SHA512
10c26e018db102358bbbad09faefc7c358092eded59bb88887896519e7cb4bc5ca94af86f62b407f2532443f454bec46d4d1ecb66d57dfbda7719b52d5818eed
-
SSDEEP
24576:EM7fgaiZEy2LhRnw4Q/SJV/vkP+gDg8fklKWzK7S2GUC9SHicUPWIrgeA/OvvKzI:gTZARnw4foGr47VGN8HZU5gu3aQj
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-