General
-
Target
fb3d7f402eb87cea1bfe90c8c4c9c96f04351a8c3acb2209fc67136de5de6979
-
Size
1.7MB
-
Sample
250127-brs96avjfq
-
MD5
926cd6e5082f31fbe0b141a6e58baecf
-
SHA1
9b48d30944ca891473a796a35dff3840c6e77eb8
-
SHA256
fb3d7f402eb87cea1bfe90c8c4c9c96f04351a8c3acb2209fc67136de5de6979
-
SHA512
f5f29175ab72a02e2195da169bfb89870a3b5f8fb190988bdd5a4e7e187aacca714ebb4df7a48c43e1ea067fa170fba581b098b3f5f8c038915129238d837283
-
SSDEEP
49152:8KlcUWdWFyTCFqB20UPqtk3pieDknv8wv:hWdWQc09k53e
Static task
static1
Behavioral task
behavioral1
Sample
fb3d7f402eb87cea1bfe90c8c4c9c96f04351a8c3acb2209fc67136de5de6979.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
fb3d7f402eb87cea1bfe90c8c4c9c96f04351a8c3acb2209fc67136de5de6979.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
fb3d7f402eb87cea1bfe90c8c4c9c96f04351a8c3acb2209fc67136de5de6979
-
Size
1.7MB
-
MD5
926cd6e5082f31fbe0b141a6e58baecf
-
SHA1
9b48d30944ca891473a796a35dff3840c6e77eb8
-
SHA256
fb3d7f402eb87cea1bfe90c8c4c9c96f04351a8c3acb2209fc67136de5de6979
-
SHA512
f5f29175ab72a02e2195da169bfb89870a3b5f8fb190988bdd5a4e7e187aacca714ebb4df7a48c43e1ea067fa170fba581b098b3f5f8c038915129238d837283
-
SSDEEP
49152:8KlcUWdWFyTCFqB20UPqtk3pieDknv8wv:hWdWQc09k53e
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-