General
-
Target
872c127d2bb34a02db6eef9968757c28fc382988a9751644d4614cb02b280bd9
-
Size
1.7MB
-
Sample
250127-fm9tkatldq
-
MD5
9eb61a68b5cf71aa89c3eea26e73ed63
-
SHA1
1130623e6184bf939b311d924f111fe4a71a6125
-
SHA256
872c127d2bb34a02db6eef9968757c28fc382988a9751644d4614cb02b280bd9
-
SHA512
556a773771d1ebff579a5624ccb36dfff706aad134e0627a1caa1187992107fc8b8f5e72cf43bdeba7c80727a84a89e8f57f895909fa36cadab242ecd63d67a3
-
SSDEEP
24576:uqujm7pY7c14vpYi4TNZ3KZxQ0feo4EPCyibrfnDrmGA8s0c4lCo6tMlzhk5jDb0:u5m7pavpYLXajRlJiPn3CoS5jOQ2Mo
Static task
static1
Behavioral task
behavioral1
Sample
872c127d2bb34a02db6eef9968757c28fc382988a9751644d4614cb02b280bd9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
872c127d2bb34a02db6eef9968757c28fc382988a9751644d4614cb02b280bd9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
872c127d2bb34a02db6eef9968757c28fc382988a9751644d4614cb02b280bd9
-
Size
1.7MB
-
MD5
9eb61a68b5cf71aa89c3eea26e73ed63
-
SHA1
1130623e6184bf939b311d924f111fe4a71a6125
-
SHA256
872c127d2bb34a02db6eef9968757c28fc382988a9751644d4614cb02b280bd9
-
SHA512
556a773771d1ebff579a5624ccb36dfff706aad134e0627a1caa1187992107fc8b8f5e72cf43bdeba7c80727a84a89e8f57f895909fa36cadab242ecd63d67a3
-
SSDEEP
24576:uqujm7pY7c14vpYi4TNZ3KZxQ0feo4EPCyibrfnDrmGA8s0c4lCo6tMlzhk5jDb0:u5m7pavpYLXajRlJiPn3CoS5jOQ2Mo
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-