General
-
Target
a7fe0330982a0ec1d976412ce3c5101a3ab687ba4f48e80ee5f5498ea2e83f69
-
Size
1.7MB
-
Sample
250126-lyytbszlgj
-
MD5
0b11da9f066fe2274bb6279b16d670bf
-
SHA1
2a767706454bf4770c369233415a8285864c400d
-
SHA256
a7fe0330982a0ec1d976412ce3c5101a3ab687ba4f48e80ee5f5498ea2e83f69
-
SHA512
fcd421e8c944219d05791c945eca8f5ebde003f12360ad8cb3f0bbe200a586f380725076925833e2b90201c069cae400898818fc2c3f620d60e3dd234a36ef55
-
SSDEEP
24576:xR47FurepwKAICFXbtQ0+MuJvl6YiFJ7gxo87uEJ0HL1PNEZFTEayWra2l7O0J2p:xWErGdIn+MiC37nEc11+pVWI7RSBPB
Static task
static1
Behavioral task
behavioral1
Sample
a7fe0330982a0ec1d976412ce3c5101a3ab687ba4f48e80ee5f5498ea2e83f69.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a7fe0330982a0ec1d976412ce3c5101a3ab687ba4f48e80ee5f5498ea2e83f69.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
a7fe0330982a0ec1d976412ce3c5101a3ab687ba4f48e80ee5f5498ea2e83f69
-
Size
1.7MB
-
MD5
0b11da9f066fe2274bb6279b16d670bf
-
SHA1
2a767706454bf4770c369233415a8285864c400d
-
SHA256
a7fe0330982a0ec1d976412ce3c5101a3ab687ba4f48e80ee5f5498ea2e83f69
-
SHA512
fcd421e8c944219d05791c945eca8f5ebde003f12360ad8cb3f0bbe200a586f380725076925833e2b90201c069cae400898818fc2c3f620d60e3dd234a36ef55
-
SSDEEP
24576:xR47FurepwKAICFXbtQ0+MuJvl6YiFJ7gxo87uEJ0HL1PNEZFTEayWra2l7O0J2p:xWErGdIn+MiC37nEc11+pVWI7RSBPB
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-