General
-
Target
41fdcbfc4fe89bcc0793b8c70449fdd3b450d42812acabb62269208bb9c55209
-
Size
1.8MB
-
Sample
250206-2x4wyssjbr
-
MD5
27da389731048fbb8009e39faafa4e8a
-
SHA1
683f9ff5a2d7de555efbd3a47885f3bf4cfb2c04
-
SHA256
41fdcbfc4fe89bcc0793b8c70449fdd3b450d42812acabb62269208bb9c55209
-
SHA512
fda9d8f51f986ac51c337e25fd1e3d81c0a187584757e0266fc6f9433f8c37b64343a183826de6f9acf39ebe4297d7f701cb2e1007ffe1e7749d330b352caac8
-
SSDEEP
49152:sV9V9gN1QAey4PazBbcCdIQh4uIBDnwHUro72:OriN1BCPyGw4ueD62
Static task
static1
Behavioral task
behavioral1
Sample
41fdcbfc4fe89bcc0793b8c70449fdd3b450d42812acabb62269208bb9c55209.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41fdcbfc4fe89bcc0793b8c70449fdd3b450d42812acabb62269208bb9c55209.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
stealc
save
http://185.215.113.37
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
41fdcbfc4fe89bcc0793b8c70449fdd3b450d42812acabb62269208bb9c55209
-
Size
1.8MB
-
MD5
27da389731048fbb8009e39faafa4e8a
-
SHA1
683f9ff5a2d7de555efbd3a47885f3bf4cfb2c04
-
SHA256
41fdcbfc4fe89bcc0793b8c70449fdd3b450d42812acabb62269208bb9c55209
-
SHA512
fda9d8f51f986ac51c337e25fd1e3d81c0a187584757e0266fc6f9433f8c37b64343a183826de6f9acf39ebe4297d7f701cb2e1007ffe1e7749d330b352caac8
-
SSDEEP
49152:sV9V9gN1QAey4PazBbcCdIQh4uIBDnwHUro72:OriN1BCPyGw4ueD62
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-