General
-
Target
22ab5795698611fa99a7c1f70bada5405ccb2fd7155e3bec2ba4e8799252c8e4
-
Size
451KB
-
Sample
240428-rl82eshh51
-
MD5
786b43ee5605201ac48f5b44799603c8
-
SHA1
5b0e5f46befa00b6d78a3b02e8b9632590780bf2
-
SHA256
22ab5795698611fa99a7c1f70bada5405ccb2fd7155e3bec2ba4e8799252c8e4
-
SHA512
92b29c7ed01af154dfff13c7ac1841f5d49688add3d51f24516249f112e2577aba9f260241bfcc6d9e98d803d64fd5e27764abe87948ddbcdb2f79ec93504aec
-
SSDEEP
6144:+0HYlMeYOX8mE94DowCxV0jZVqmnvi1UVX1Zbt2S0gjaUK:+04lMXmQ4LCxWjZji1U/rhaUK
Static task
static1
Behavioral task
behavioral1
Sample
22ab5795698611fa99a7c1f70bada5405ccb2fd7155e3bec2ba4e8799252c8e4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
22ab5795698611fa99a7c1f70bada5405ccb2fd7155e3bec2ba4e8799252c8e4.exe
Resource
win11-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
22ab5795698611fa99a7c1f70bada5405ccb2fd7155e3bec2ba4e8799252c8e4
-
Size
451KB
-
MD5
786b43ee5605201ac48f5b44799603c8
-
SHA1
5b0e5f46befa00b6d78a3b02e8b9632590780bf2
-
SHA256
22ab5795698611fa99a7c1f70bada5405ccb2fd7155e3bec2ba4e8799252c8e4
-
SHA512
92b29c7ed01af154dfff13c7ac1841f5d49688add3d51f24516249f112e2577aba9f260241bfcc6d9e98d803d64fd5e27764abe87948ddbcdb2f79ec93504aec
-
SSDEEP
6144:+0HYlMeYOX8mE94DowCxV0jZVqmnvi1UVX1Zbt2S0gjaUK:+04lMXmQ4LCxWjZji1U/rhaUK
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-