General
-
Target
f3499823ccca35d858ae2653142ded48.exe
-
Size
451KB
-
Sample
240428-t1cymsbg73
-
MD5
f3499823ccca35d858ae2653142ded48
-
SHA1
86477f41bd8cb48a2cf7922cc89acdb3b7a4f58d
-
SHA256
c22e7af2dbc1c8349559c3aa56a868d77541cab76a0fef74c248af97a1957d23
-
SHA512
721a7b13d4d2fd85f267cf62840ca0e26c3b36f601dfce64731b96db0edd0b526535a0008449a4e7a44ba67ea097a69b147792393fb1581f55e380d63c22d68d
-
SSDEEP
6144:+0HYlMeYOX8mE94DowCxV0jZVqmnvi1UVX1Zbt2S0gjaUI:+04lMXmQ4LCxWjZji1U/rhaUI
Static task
static1
Behavioral task
behavioral1
Sample
f3499823ccca35d858ae2653142ded48.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3499823ccca35d858ae2653142ded48.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
f3499823ccca35d858ae2653142ded48.exe
-
Size
451KB
-
MD5
f3499823ccca35d858ae2653142ded48
-
SHA1
86477f41bd8cb48a2cf7922cc89acdb3b7a4f58d
-
SHA256
c22e7af2dbc1c8349559c3aa56a868d77541cab76a0fef74c248af97a1957d23
-
SHA512
721a7b13d4d2fd85f267cf62840ca0e26c3b36f601dfce64731b96db0edd0b526535a0008449a4e7a44ba67ea097a69b147792393fb1581f55e380d63c22d68d
-
SSDEEP
6144:+0HYlMeYOX8mE94DowCxV0jZVqmnvi1UVX1Zbt2S0gjaUI:+04lMXmQ4LCxWjZji1U/rhaUI
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-