General
-
Target
d37e577811bfb89fca2fc42ef187806e5319e07520e38c644a0da6517df346bc.exe
-
Size
1.7MB
-
Sample
250202-s45mdszpal
-
MD5
3fda9c028884fc85c3bb3848bf955e37
-
SHA1
840751c4a8aa16454ab07d4f90a64d7f1e27b902
-
SHA256
d37e577811bfb89fca2fc42ef187806e5319e07520e38c644a0da6517df346bc
-
SHA512
0323f929964687de2cd7f8a6c4144d4d6fdacaf104a664ea160bcc347eed8b4593dc25b4830b098921634206fe69c40b12ef903a779cd99baadcf85faff77f58
-
SSDEEP
49152:nJx1j9RIu7DBd9i3eoiTReDkzj0z8JDwNPpcuyh:nJz9RB3R1TRtzj0tPpU
Static task
static1
Behavioral task
behavioral1
Sample
d37e577811bfb89fca2fc42ef187806e5319e07520e38c644a0da6517df346bc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d37e577811bfb89fca2fc42ef187806e5319e07520e38c644a0da6517df346bc.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
d37e577811bfb89fca2fc42ef187806e5319e07520e38c644a0da6517df346bc.exe
-
Size
1.7MB
-
MD5
3fda9c028884fc85c3bb3848bf955e37
-
SHA1
840751c4a8aa16454ab07d4f90a64d7f1e27b902
-
SHA256
d37e577811bfb89fca2fc42ef187806e5319e07520e38c644a0da6517df346bc
-
SHA512
0323f929964687de2cd7f8a6c4144d4d6fdacaf104a664ea160bcc347eed8b4593dc25b4830b098921634206fe69c40b12ef903a779cd99baadcf85faff77f58
-
SSDEEP
49152:nJx1j9RIu7DBd9i3eoiTReDkzj0z8JDwNPpcuyh:nJz9RB3R1TRtzj0tPpU
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-