General
-
Target
f5b05fca08794f227270a0a6cba86a6a6ae33ce47218c2e73ac081859310d65c
-
Size
1.7MB
-
Sample
250126-x4gmsa1rhk
-
MD5
2bbde981b3bdc74655574d8b8d7fcdb7
-
SHA1
37c5568c9a0e74d56639eb9b760d7aedcd7b8fa2
-
SHA256
f5b05fca08794f227270a0a6cba86a6a6ae33ce47218c2e73ac081859310d65c
-
SHA512
1f0192ee442470c6faafcbc6b5daf44a5147c30e07a5e018a0d9392079cdce187208a7a24e85f74fb7faf4d0847096cb36c1db307d846e237026d50999010370
-
SSDEEP
24576:93OU3w5h6LPhwBC5ipltwwWbva9nTwdO+rjdHhFzyoRZ+xn8d0GxaxdMZtoJ6S:QU3wd/l6w4iiOM2U+xnq+sti
Static task
static1
Behavioral task
behavioral1
Sample
f5b05fca08794f227270a0a6cba86a6a6ae33ce47218c2e73ac081859310d65c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f5b05fca08794f227270a0a6cba86a6a6ae33ce47218c2e73ac081859310d65c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
f5b05fca08794f227270a0a6cba86a6a6ae33ce47218c2e73ac081859310d65c
-
Size
1.7MB
-
MD5
2bbde981b3bdc74655574d8b8d7fcdb7
-
SHA1
37c5568c9a0e74d56639eb9b760d7aedcd7b8fa2
-
SHA256
f5b05fca08794f227270a0a6cba86a6a6ae33ce47218c2e73ac081859310d65c
-
SHA512
1f0192ee442470c6faafcbc6b5daf44a5147c30e07a5e018a0d9392079cdce187208a7a24e85f74fb7faf4d0847096cb36c1db307d846e237026d50999010370
-
SSDEEP
24576:93OU3w5h6LPhwBC5ipltwwWbva9nTwdO+rjdHhFzyoRZ+xn8d0GxaxdMZtoJ6S:QU3wd/l6w4iiOM2U+xnq+sti
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-