General
-
Target
66b56c58735b627dedd96cd9e079be2f0a167df42b15932f054e6e2013c8ce41
-
Size
395KB
-
Sample
240426-ezblvshh82
-
MD5
d39b7113410bf19d48d1f656c0ab009c
-
SHA1
133ff7840b78b98d639f14ebcc33ad8907503ca5
-
SHA256
66b56c58735b627dedd96cd9e079be2f0a167df42b15932f054e6e2013c8ce41
-
SHA512
aac3a59575c6ad91c756f68b37419fe6d90ed1c3f2a481ab4d774353dec462ea9e08e00711b990c0307078ed740360d5d651f3454cd76cff1e71ce0afa10fc77
-
SSDEEP
6144:tJCwBabC3kBgaI2oQGIbxBlzI6V3EKOyepROs4MPI:tJTs9gaIpQp1/zI6EKOyepRO0I
Static task
static1
Behavioral task
behavioral1
Sample
66b56c58735b627dedd96cd9e079be2f0a167df42b15932f054e6e2013c8ce41.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
stealc
http://185.172.128.76
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
66b56c58735b627dedd96cd9e079be2f0a167df42b15932f054e6e2013c8ce41
-
Size
395KB
-
MD5
d39b7113410bf19d48d1f656c0ab009c
-
SHA1
133ff7840b78b98d639f14ebcc33ad8907503ca5
-
SHA256
66b56c58735b627dedd96cd9e079be2f0a167df42b15932f054e6e2013c8ce41
-
SHA512
aac3a59575c6ad91c756f68b37419fe6d90ed1c3f2a481ab4d774353dec462ea9e08e00711b990c0307078ed740360d5d651f3454cd76cff1e71ce0afa10fc77
-
SSDEEP
6144:tJCwBabC3kBgaI2oQGIbxBlzI6V3EKOyepROs4MPI:tJTs9gaIpQp1/zI6EKOyepRO0I
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-