General
-
Target
1453acb57fda5d0c89c052540f531b20e1211112b2433dede93b43c726cfe656
-
Size
445KB
-
Sample
240420-tq6g7sch4x
-
MD5
679dbda18984bf8e308e5eee664eac7d
-
SHA1
0d5c8ec76fc459e1b8ef433412c5d18f1e550254
-
SHA256
1453acb57fda5d0c89c052540f531b20e1211112b2433dede93b43c726cfe656
-
SHA512
9b7cf48db7bf51ca8c7086e75dfa9cb41e9e987b21ff8f7bc8326042bc27145b3154d84f5f59f997665bc62eb238bf1c5bf3f42d378c75f27a851f3feb5203ee
-
SSDEEP
6144:JekG6S4KJiiEPhpbas7CdbWTExRYde0GsybfjRYHx7IlvDbm+NRASZ4:4kG6fTxasubCde0GxrRNlvDbvNyU4
Static task
static1
Behavioral task
behavioral1
Sample
1453acb57fda5d0c89c052540f531b20e1211112b2433dede93b43c726cfe656.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
1453acb57fda5d0c89c052540f531b20e1211112b2433dede93b43c726cfe656
-
Size
445KB
-
MD5
679dbda18984bf8e308e5eee664eac7d
-
SHA1
0d5c8ec76fc459e1b8ef433412c5d18f1e550254
-
SHA256
1453acb57fda5d0c89c052540f531b20e1211112b2433dede93b43c726cfe656
-
SHA512
9b7cf48db7bf51ca8c7086e75dfa9cb41e9e987b21ff8f7bc8326042bc27145b3154d84f5f59f997665bc62eb238bf1c5bf3f42d378c75f27a851f3feb5203ee
-
SSDEEP
6144:JekG6S4KJiiEPhpbas7CdbWTExRYde0GsybfjRYHx7IlvDbm+NRASZ4:4kG6fTxasubCde0GxrRNlvDbvNyU4
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-