General
-
Target
2b471b35bd4403025e45c7e36a06eb83.exe
-
Size
456KB
-
Sample
240428-g1fnbaaa5w
-
MD5
2b471b35bd4403025e45c7e36a06eb83
-
SHA1
eb8470ca7df15369f33f454fa86d5ab33d9c8e07
-
SHA256
b881e013c5a32f3d0a5f9bc38a70c87383dbf58a764b7b88445d014037593fa9
-
SHA512
ce235dddc6ab67f2bc2cd6d3aa4c35d5a3c3a30c84dcfa969df3987b1bbbc600664a6ae7bb285e602840eb628cf1e00c3db2672824a0d6b918d01794593cdd6b
-
SSDEEP
12288:SMAzoV3Y9YLR4W/Rt7yL794skEZUXwE8Y:IoV3Y9YLRN/XQUOUXwE8Y
Static task
static1
Behavioral task
behavioral1
Sample
2b471b35bd4403025e45c7e36a06eb83.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b471b35bd4403025e45c7e36a06eb83.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.62
-
url_path
/902e53a07830e030.php
Targets
-
-
Target
2b471b35bd4403025e45c7e36a06eb83.exe
-
Size
456KB
-
MD5
2b471b35bd4403025e45c7e36a06eb83
-
SHA1
eb8470ca7df15369f33f454fa86d5ab33d9c8e07
-
SHA256
b881e013c5a32f3d0a5f9bc38a70c87383dbf58a764b7b88445d014037593fa9
-
SHA512
ce235dddc6ab67f2bc2cd6d3aa4c35d5a3c3a30c84dcfa969df3987b1bbbc600664a6ae7bb285e602840eb628cf1e00c3db2672824a0d6b918d01794593cdd6b
-
SSDEEP
12288:SMAzoV3Y9YLR4W/Rt7yL794skEZUXwE8Y:IoV3Y9YLRN/XQUOUXwE8Y
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-