Analysis
-
max time kernel
104s -
max time network
105s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
submitted
05/04/2025, 13:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
random.exe
Resource
win10ltsc2021-20250314-en
1 signatures
150 seconds
General
-
Target
random.exe
-
Size
2.4MB
-
MD5
bb7efd4c8ea07b91728e2a27cc8cf6f4
-
SHA1
9b5470ff21be58857d85e87d4174647e0ceb10fd
-
SHA256
e205646761f59f23d5c8a8483f8a03a313d3b435b302d3a37061840b5cc084c3
-
SHA512
b3c51e8ffb4b98a21f1d7c446d6b46914333cfe2b003e8f04feccc9267194e6dc83086c5c580a796012f237abdb63c0e7bbd99433cd60edc1dc2bbbf712f472c
-
SSDEEP
49152:AKn1C36HXns3gNFs4MYJaZpE60nYHPJbE/JEsvwlbX7j80MUpn0B:nXnXFs4M4Ihb0Ksvwl3803n0
Malware Config
Extracted
Family
stealc
Botnet
suka
C2
45.93.20.28
Attributes
-
url_path
/3d15e67552d448ff.php
rc4.plain
Signatures
-
Stealc family
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion random.exe