General
-
Target
e619256bc2f5febff2f90d0178f28b01216ff2a7729ab1c1cea89bb8314944c3
-
Size
5.0MB
-
Sample
250127-jz9wwaypds
-
MD5
d79e76a87110d790db154e796bfc509e
-
SHA1
24e1801fb9eee7070dad9c0abd2fe9f16ac48643
-
SHA256
e619256bc2f5febff2f90d0178f28b01216ff2a7729ab1c1cea89bb8314944c3
-
SHA512
8aee578625c2663c4334da4e559570c27e812018fb78b2f5d3faafd2d44973a2678d0c7938e689cd3ea3f0284842238901fc2b3eae5902618f7e7e3902341fc2
-
SSDEEP
24576:vKLij3eEp+wUqSgP5M78dyuvVpB35UGnKZaOXiKkhL+bQiI23JGJOVo8yuIzzXNP:iL0eXV95JxvlIyJGJOV/yuCzMswLD
Static task
static1
Behavioral task
behavioral1
Sample
e619256bc2f5febff2f90d0178f28b01216ff2a7729ab1c1cea89bb8314944c3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e619256bc2f5febff2f90d0178f28b01216ff2a7729ab1c1cea89bb8314944c3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
e619256bc2f5febff2f90d0178f28b01216ff2a7729ab1c1cea89bb8314944c3
-
Size
5.0MB
-
MD5
d79e76a87110d790db154e796bfc509e
-
SHA1
24e1801fb9eee7070dad9c0abd2fe9f16ac48643
-
SHA256
e619256bc2f5febff2f90d0178f28b01216ff2a7729ab1c1cea89bb8314944c3
-
SHA512
8aee578625c2663c4334da4e559570c27e812018fb78b2f5d3faafd2d44973a2678d0c7938e689cd3ea3f0284842238901fc2b3eae5902618f7e7e3902341fc2
-
SSDEEP
24576:vKLij3eEp+wUqSgP5M78dyuvVpB35UGnKZaOXiKkhL+bQiI23JGJOVo8yuIzzXNP:iL0eXV95JxvlIyJGJOV/yuCzMswLD
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-