General
-
Target
18e0c5edb8ea07497409dd0f477bbdc1.exe
-
Size
347KB
-
Sample
240429-l2sfqagc9x
-
MD5
18e0c5edb8ea07497409dd0f477bbdc1
-
SHA1
3ffea66b9005732e51d20d0e10a921c211702f5d
-
SHA256
46c349e1b774320b7c458b390f61a6e73bcabca4b90c5c6c47229face01360b1
-
SHA512
18e6dbcfed7a69935f936354ea50fdbddefa539762345e6327a7077694d9fe515155a55c045f7fb1e44f664fadfd5ca48ef3935aa7651d4024109081c57ff117
-
SSDEEP
6144:aGNJdD4C4xkIsmIqLoSj9hXc6+Bl7+sysO+ThbGlN50BdYjFqq:d5a+IsmhoSZG5lysynD50Hbq
Static task
static1
Behavioral task
behavioral1
Sample
18e0c5edb8ea07497409dd0f477bbdc1.exe
Resource
win7-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
18e0c5edb8ea07497409dd0f477bbdc1.exe
-
Size
347KB
-
MD5
18e0c5edb8ea07497409dd0f477bbdc1
-
SHA1
3ffea66b9005732e51d20d0e10a921c211702f5d
-
SHA256
46c349e1b774320b7c458b390f61a6e73bcabca4b90c5c6c47229face01360b1
-
SHA512
18e6dbcfed7a69935f936354ea50fdbddefa539762345e6327a7077694d9fe515155a55c045f7fb1e44f664fadfd5ca48ef3935aa7651d4024109081c57ff117
-
SSDEEP
6144:aGNJdD4C4xkIsmIqLoSj9hXc6+Bl7+sysO+ThbGlN50BdYjFqq:d5a+IsmhoSZG5lysynD50Hbq
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-