General
-
Target
random.exe
-
Size
2.4MB
-
Sample
250405-qg3s6szlx9
-
MD5
bb7efd4c8ea07b91728e2a27cc8cf6f4
-
SHA1
9b5470ff21be58857d85e87d4174647e0ceb10fd
-
SHA256
e205646761f59f23d5c8a8483f8a03a313d3b435b302d3a37061840b5cc084c3
-
SHA512
b3c51e8ffb4b98a21f1d7c446d6b46914333cfe2b003e8f04feccc9267194e6dc83086c5c580a796012f237abdb63c0e7bbd99433cd60edc1dc2bbbf712f472c
-
SSDEEP
49152:AKn1C36HXns3gNFs4MYJaZpE60nYHPJbE/JEsvwlbX7j80MUpn0B:nXnXFs4M4Ihb0Ksvwl3803n0
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win10ltsc2021-20250314-en
Malware Config
Extracted
stealc
suka
45.93.20.28
-
url_path
/3d15e67552d448ff.php
Targets
-
-
Target
random.exe
-
Size
2.4MB
-
MD5
bb7efd4c8ea07b91728e2a27cc8cf6f4
-
SHA1
9b5470ff21be58857d85e87d4174647e0ceb10fd
-
SHA256
e205646761f59f23d5c8a8483f8a03a313d3b435b302d3a37061840b5cc084c3
-
SHA512
b3c51e8ffb4b98a21f1d7c446d6b46914333cfe2b003e8f04feccc9267194e6dc83086c5c580a796012f237abdb63c0e7bbd99433cd60edc1dc2bbbf712f472c
-
SSDEEP
49152:AKn1C36HXns3gNFs4MYJaZpE60nYHPJbE/JEsvwlbX7j80MUpn0B:nXnXFs4M4Ihb0Ksvwl3803n0
-
Stealc family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-