General
-
Target
fe12713fcc721515aac3aeed8a8f7802879aa71648c2e6f2c190ffac96b109a5
-
Size
447KB
-
Sample
240409-eqsh1sec48
-
MD5
1eab9c6c10e4bb94eb509ef72de18a8f
-
SHA1
1d9cbde314dc78232084a239e9dd4b07b6c859dd
-
SHA256
fe12713fcc721515aac3aeed8a8f7802879aa71648c2e6f2c190ffac96b109a5
-
SHA512
e7f269b943a76722d0e5fbf3cfc634ea44bfc058214c82148837050fe5d61d49aa31a4f44badf44474d7e338aa22ad22b6ad3f1e42d41cf0dca64617dbc55996
-
SSDEEP
6144:ipeiI1F1x0WnZFsHxbLWK+fAaC2hAf3Ij6khUI:ceb1F1x0WnZFsHhWK3R2h56kGI
Static task
static1
Behavioral task
behavioral1
Sample
fe12713fcc721515aac3aeed8a8f7802879aa71648c2e6f2c190ffac96b109a5.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
fe12713fcc721515aac3aeed8a8f7802879aa71648c2e6f2c190ffac96b109a5
-
Size
447KB
-
MD5
1eab9c6c10e4bb94eb509ef72de18a8f
-
SHA1
1d9cbde314dc78232084a239e9dd4b07b6c859dd
-
SHA256
fe12713fcc721515aac3aeed8a8f7802879aa71648c2e6f2c190ffac96b109a5
-
SHA512
e7f269b943a76722d0e5fbf3cfc634ea44bfc058214c82148837050fe5d61d49aa31a4f44badf44474d7e338aa22ad22b6ad3f1e42d41cf0dca64617dbc55996
-
SSDEEP
6144:ipeiI1F1x0WnZFsHxbLWK+fAaC2hAf3Ij6khUI:ceb1F1x0WnZFsHhWK3R2h56kGI
-
Detect ZGRat V1
-
Detect binaries embedding considerable number of MFA browser extension IDs.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects encrypted or obfuscated .NET executables
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-