General
-
Target
c173cfcb0adfa3013a398638789bf4350601cce0e1c55a456d98311543062f82.exe
-
Size
445KB
-
Sample
240409-clbzcsbc74
-
MD5
51e5979460e5a9dc941c03bc76cc3855
-
SHA1
87e5501bbc72be1d0b763acec9bf08c9db26a8d1
-
SHA256
c173cfcb0adfa3013a398638789bf4350601cce0e1c55a456d98311543062f82
-
SHA512
a690fe8eb9fe96aa0470ba14a0468ff9fe8a9573ae37617240f04d0ef0f77910cf09776cd8814638e6fe741e126d0b1b20c667b676ea3d3721affa57d281ba1e
-
SSDEEP
12288:f9zyluCg7RvcQ7tZRsuPE16N0N9k9ptHMF:PCg7RvcKKnitHMF
Static task
static1
Behavioral task
behavioral1
Sample
c173cfcb0adfa3013a398638789bf4350601cce0e1c55a456d98311543062f82.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
c173cfcb0adfa3013a398638789bf4350601cce0e1c55a456d98311543062f82.exe
-
Size
445KB
-
MD5
51e5979460e5a9dc941c03bc76cc3855
-
SHA1
87e5501bbc72be1d0b763acec9bf08c9db26a8d1
-
SHA256
c173cfcb0adfa3013a398638789bf4350601cce0e1c55a456d98311543062f82
-
SHA512
a690fe8eb9fe96aa0470ba14a0468ff9fe8a9573ae37617240f04d0ef0f77910cf09776cd8814638e6fe741e126d0b1b20c667b676ea3d3721affa57d281ba1e
-
SSDEEP
12288:f9zyluCg7RvcQ7tZRsuPE16N0N9k9ptHMF:PCg7RvcKKnitHMF
-
Detect ZGRat V1
-
Detect binaries embedding considerable number of MFA browser extension IDs.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects encrypted or obfuscated .NET executables
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-