General
-
Target
845f79a7b30edf97aafb682109eb1b5cd205859c2b10f786480920112a278b9c.exe
-
Size
1.7MB
-
Sample
250208-p1t5psxkap
-
MD5
b9c972302e3b1e12da876f169ab11ecb
-
SHA1
99504a9da2b9d64c20254c19ae6a9ec73cb3c763
-
SHA256
845f79a7b30edf97aafb682109eb1b5cd205859c2b10f786480920112a278b9c
-
SHA512
1289c13a39c7314741f20f00a8937dbcbe40139e8575897d0011fce3a502a7fb2921993bd17fd9500e108897febc86886864e1d31d2a6b38f3d9c1233553c3be
-
SSDEEP
49152:I3U7sUy61ZW12DJT9WZCpq+amN8uyGzWV/6f5zGwbvDMcov:B7sUy6vWYhPpq8zzVGwbvDpM
Static task
static1
Behavioral task
behavioral1
Sample
845f79a7b30edf97aafb682109eb1b5cd205859c2b10f786480920112a278b9c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
845f79a7b30edf97aafb682109eb1b5cd205859c2b10f786480920112a278b9c.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
stealc
kira
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Targets
-
-
Target
845f79a7b30edf97aafb682109eb1b5cd205859c2b10f786480920112a278b9c.exe
-
Size
1.7MB
-
MD5
b9c972302e3b1e12da876f169ab11ecb
-
SHA1
99504a9da2b9d64c20254c19ae6a9ec73cb3c763
-
SHA256
845f79a7b30edf97aafb682109eb1b5cd205859c2b10f786480920112a278b9c
-
SHA512
1289c13a39c7314741f20f00a8937dbcbe40139e8575897d0011fce3a502a7fb2921993bd17fd9500e108897febc86886864e1d31d2a6b38f3d9c1233553c3be
-
SSDEEP
49152:I3U7sUy61ZW12DJT9WZCpq+amN8uyGzWV/6f5zGwbvDMcov:B7sUy6vWYhPpq8zzVGwbvDpM
Score10/10-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-