General
-
Target
6e61742d0ccebdff71926d911d296b7b.exe
-
Size
347KB
-
Sample
240427-2fc2xaaa46
-
MD5
6e61742d0ccebdff71926d911d296b7b
-
SHA1
7b4a71fa17317a10e9ec7dc3fbb09f85ec01c7e2
-
SHA256
a9ca31f1703251ad8282dd252ceebb71ec3a69ed09948a56431f0678a41e7e61
-
SHA512
c4a188519fc9442933e9dba1c17edd7cfb670a0449065f97993cbefceb2743bb6572a2e6702cbb6563dc47e28ed1180fd1d08be41e0cfbaef714b2a162856bed
-
SSDEEP
6144:ToBqFgnH6oK/xcYNKD8r+syjBJw45rtMLYC43J9fa7nxNHnKTV:EawahCYgD8CsKJw4/MchjCnMV
Static task
static1
Behavioral task
behavioral1
Sample
6e61742d0ccebdff71926d911d296b7b.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
6e61742d0ccebdff71926d911d296b7b.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.62
-
url_path
/902e53a07830e030.php
Targets
-
-
Target
6e61742d0ccebdff71926d911d296b7b.exe
-
Size
347KB
-
MD5
6e61742d0ccebdff71926d911d296b7b
-
SHA1
7b4a71fa17317a10e9ec7dc3fbb09f85ec01c7e2
-
SHA256
a9ca31f1703251ad8282dd252ceebb71ec3a69ed09948a56431f0678a41e7e61
-
SHA512
c4a188519fc9442933e9dba1c17edd7cfb670a0449065f97993cbefceb2743bb6572a2e6702cbb6563dc47e28ed1180fd1d08be41e0cfbaef714b2a162856bed
-
SSDEEP
6144:ToBqFgnH6oK/xcYNKD8r+syjBJw45rtMLYC43J9fa7nxNHnKTV:EawahCYgD8CsKJw4/MchjCnMV
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-