General
-
Target
fcf64e9ed52eafbdc3f47abb46ba4606.exe
-
Size
455KB
-
Sample
240428-e2hsysga59
-
MD5
fcf64e9ed52eafbdc3f47abb46ba4606
-
SHA1
5efbd9889f48565bfddcd27f0e760529a4ac201b
-
SHA256
59c2de875c225026789ad7a1cd5ffe9907ce6cc8c87ba03fe58ec496cfc1b74e
-
SHA512
2fb5e5efe6936b8dee1dfe69805f021e127fcd32f714cf9459f7bccf6c3c5fd41355bfcae8e6c871e89c90f2b3b85c9967d3234d8f0a05158ae16814a0b8c35f
-
SSDEEP
6144:dndKNo69iOHScmTvdTtWxM0xJe5oTBCLV9n7s3ODEx:dnsN9SJZTtWxM0T3cnI3wEx
Static task
static1
Behavioral task
behavioral1
Sample
fcf64e9ed52eafbdc3f47abb46ba4606.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fcf64e9ed52eafbdc3f47abb46ba4606.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.62
-
url_path
/902e53a07830e030.php
Targets
-
-
Target
fcf64e9ed52eafbdc3f47abb46ba4606.exe
-
Size
455KB
-
MD5
fcf64e9ed52eafbdc3f47abb46ba4606
-
SHA1
5efbd9889f48565bfddcd27f0e760529a4ac201b
-
SHA256
59c2de875c225026789ad7a1cd5ffe9907ce6cc8c87ba03fe58ec496cfc1b74e
-
SHA512
2fb5e5efe6936b8dee1dfe69805f021e127fcd32f714cf9459f7bccf6c3c5fd41355bfcae8e6c871e89c90f2b3b85c9967d3234d8f0a05158ae16814a0b8c35f
-
SSDEEP
6144:dndKNo69iOHScmTvdTtWxM0xJe5oTBCLV9n7s3ODEx:dnsN9SJZTtWxM0T3cnI3wEx
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-