General
-
Target
90208d9829610c65880196d3e28539b95394639d9b2c6a86c57d6f54d8962e60
-
Size
1.7MB
-
Sample
250126-s1ypnsvqaw
-
MD5
4dcc556f843a576529c081a6e1c878e2
-
SHA1
81844169aee4b15c2ead4b70891ee4a7daf65cf6
-
SHA256
90208d9829610c65880196d3e28539b95394639d9b2c6a86c57d6f54d8962e60
-
SHA512
80083f0538339f19ad077ac53ee6e847c6c30d611444290431c050550b25034331b11c5acb91335a4dc7dde4368ef768cb96f318bf08e550fe819f1fec4d4b98
-
SSDEEP
49152:vQ3Uvp3RnmYPybOysEgQh2MvqGF7ATjLaZLO:4onebO/v0pAmZL
Static task
static1
Behavioral task
behavioral1
Sample
90208d9829610c65880196d3e28539b95394639d9b2c6a86c57d6f54d8962e60.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
90208d9829610c65880196d3e28539b95394639d9b2c6a86c57d6f54d8962e60.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
90208d9829610c65880196d3e28539b95394639d9b2c6a86c57d6f54d8962e60
-
Size
1.7MB
-
MD5
4dcc556f843a576529c081a6e1c878e2
-
SHA1
81844169aee4b15c2ead4b70891ee4a7daf65cf6
-
SHA256
90208d9829610c65880196d3e28539b95394639d9b2c6a86c57d6f54d8962e60
-
SHA512
80083f0538339f19ad077ac53ee6e847c6c30d611444290431c050550b25034331b11c5acb91335a4dc7dde4368ef768cb96f318bf08e550fe819f1fec4d4b98
-
SSDEEP
49152:vQ3Uvp3RnmYPybOysEgQh2MvqGF7ATjLaZLO:4onebO/v0pAmZL
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-