General
-
Target
b7c3785aa2b9f10fc77bf33df04b2845d06d0ccfefd9df2af598f7ac0cf99f17.exe
-
Size
1.7MB
-
Sample
250126-egvl1s1lgx
-
MD5
470aa1549c4266690a1a8d6d921017f9
-
SHA1
57359f54841f8d0a4ae15fa53e9eb3dca725fa36
-
SHA256
b7c3785aa2b9f10fc77bf33df04b2845d06d0ccfefd9df2af598f7ac0cf99f17
-
SHA512
342cfe3b63c4654baea57b3217d2a841083ea41e2b13f218ad861086b5dad8a043ab110259650cb537f7e43e5dfbf706f1dbff33554bae9803637111b9836513
-
SSDEEP
49152:KP91YLxkL49T6DuKD/xuR5LFIQgEh4ULV6GV0qrC6C5Yon:KVmJcbQR5RAfjGXrCZ
Static task
static1
Behavioral task
behavioral1
Sample
b7c3785aa2b9f10fc77bf33df04b2845d06d0ccfefd9df2af598f7ac0cf99f17.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b7c3785aa2b9f10fc77bf33df04b2845d06d0ccfefd9df2af598f7ac0cf99f17.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
b7c3785aa2b9f10fc77bf33df04b2845d06d0ccfefd9df2af598f7ac0cf99f17.exe
-
Size
1.7MB
-
MD5
470aa1549c4266690a1a8d6d921017f9
-
SHA1
57359f54841f8d0a4ae15fa53e9eb3dca725fa36
-
SHA256
b7c3785aa2b9f10fc77bf33df04b2845d06d0ccfefd9df2af598f7ac0cf99f17
-
SHA512
342cfe3b63c4654baea57b3217d2a841083ea41e2b13f218ad861086b5dad8a043ab110259650cb537f7e43e5dfbf706f1dbff33554bae9803637111b9836513
-
SSDEEP
49152:KP91YLxkL49T6DuKD/xuR5LFIQgEh4ULV6GV0qrC6C5Yon:KVmJcbQR5RAfjGXrCZ
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-