General
-
Target
140fee25984c222f1eb081d7c19bf50af552914c6bb756a6898aa8f460286f3d
-
Size
1.7MB
-
Sample
250125-r8a3xaxmfs
-
MD5
91d86380fa17ea2c050c07e9b27f5784
-
SHA1
30f0f0131360a102442bc3bd09504a4311da48bc
-
SHA256
140fee25984c222f1eb081d7c19bf50af552914c6bb756a6898aa8f460286f3d
-
SHA512
b55f82c0c6d13ac6a5fa3c50656ed67bcc5b38a14ef3c5ba3fdcf5188be0dc02bc79e2a95494bb8b12638d4c60b83cb347239b0f9468bd08a91482b1b043fcec
-
SSDEEP
49152:pDZ5P89p29ATzbGlBsjS9X3boYOG/BfiF:pAsS3bGl6u9X3XOG/Ba
Static task
static1
Behavioral task
behavioral1
Sample
140fee25984c222f1eb081d7c19bf50af552914c6bb756a6898aa8f460286f3d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
140fee25984c222f1eb081d7c19bf50af552914c6bb756a6898aa8f460286f3d.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
140fee25984c222f1eb081d7c19bf50af552914c6bb756a6898aa8f460286f3d
-
Size
1.7MB
-
MD5
91d86380fa17ea2c050c07e9b27f5784
-
SHA1
30f0f0131360a102442bc3bd09504a4311da48bc
-
SHA256
140fee25984c222f1eb081d7c19bf50af552914c6bb756a6898aa8f460286f3d
-
SHA512
b55f82c0c6d13ac6a5fa3c50656ed67bcc5b38a14ef3c5ba3fdcf5188be0dc02bc79e2a95494bb8b12638d4c60b83cb347239b0f9468bd08a91482b1b043fcec
-
SSDEEP
49152:pDZ5P89p29ATzbGlBsjS9X3boYOG/BfiF:pAsS3bGl6u9X3XOG/Ba
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-