General
-
Target
cb7a438a0701c7413b144b78f2029a1dd5a5b0c071db4534113328c5972e0018
-
Size
1.8MB
-
Sample
250126-zwqxlatlgy
-
MD5
31228ef3dcc7c6df49b20a94da118106
-
SHA1
d1509917e7ba4bca134c0ef95a9df5318c078cde
-
SHA256
cb7a438a0701c7413b144b78f2029a1dd5a5b0c071db4534113328c5972e0018
-
SHA512
a6ae041376a1773a39444e9519d87ef07fc983210b4ffe8e9fb69ca4846ad2c2abc45eac97e1e46ab11c13100b392c90d58613a7fced7c55b92bdf47f96ef639
-
SSDEEP
49152:uX6JypYYcwhBHXdTXOyVKmHBDmb0QBASVnT:focwhlXZtMmhQBASVnT
Static task
static1
Behavioral task
behavioral1
Sample
cb7a438a0701c7413b144b78f2029a1dd5a5b0c071db4534113328c5972e0018.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cb7a438a0701c7413b144b78f2029a1dd5a5b0c071db4534113328c5972e0018.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
cb7a438a0701c7413b144b78f2029a1dd5a5b0c071db4534113328c5972e0018
-
Size
1.8MB
-
MD5
31228ef3dcc7c6df49b20a94da118106
-
SHA1
d1509917e7ba4bca134c0ef95a9df5318c078cde
-
SHA256
cb7a438a0701c7413b144b78f2029a1dd5a5b0c071db4534113328c5972e0018
-
SHA512
a6ae041376a1773a39444e9519d87ef07fc983210b4ffe8e9fb69ca4846ad2c2abc45eac97e1e46ab11c13100b392c90d58613a7fced7c55b92bdf47f96ef639
-
SSDEEP
49152:uX6JypYYcwhBHXdTXOyVKmHBDmb0QBASVnT:focwhlXZtMmhQBASVnT
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-