General
-
Target
f8bd860416800f8b0fecdbe7c2844ca006a350a2116ee354e0b74d0ee5b7c915
-
Size
397KB
-
Sample
240429-pr6r5sba7s
-
MD5
da197cf1b0266845d29c56ff03eaf54f
-
SHA1
3490e9b3bab204bf3384cb61ba10c2cf19f3ab1a
-
SHA256
f8bd860416800f8b0fecdbe7c2844ca006a350a2116ee354e0b74d0ee5b7c915
-
SHA512
9f16b19df46f71030c3e2871ba1007ce6905707a25ca528846eddb03944526408bd1ad125f3d2e12ef3e77afac18ca6f03d2e91d575070a05f3380a2331b9298
-
SSDEEP
6144:4Ia+pYfR7NC9yRjMy0TwJ+r+u0E9HAhRH8XEk+k5md:HafK490T48wOHQF8HXq
Static task
static1
Behavioral task
behavioral1
Sample
f8bd860416800f8b0fecdbe7c2844ca006a350a2116ee354e0b74d0ee5b7c915.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.151
-
url_path
/7043a0c6a68d9c65.php
Targets
-
-
Target
f8bd860416800f8b0fecdbe7c2844ca006a350a2116ee354e0b74d0ee5b7c915
-
Size
397KB
-
MD5
da197cf1b0266845d29c56ff03eaf54f
-
SHA1
3490e9b3bab204bf3384cb61ba10c2cf19f3ab1a
-
SHA256
f8bd860416800f8b0fecdbe7c2844ca006a350a2116ee354e0b74d0ee5b7c915
-
SHA512
9f16b19df46f71030c3e2871ba1007ce6905707a25ca528846eddb03944526408bd1ad125f3d2e12ef3e77afac18ca6f03d2e91d575070a05f3380a2331b9298
-
SSDEEP
6144:4Ia+pYfR7NC9yRjMy0TwJ+r+u0E9HAhRH8XEk+k5md:HafK490T48wOHQF8HXq
-
Detects Arechclient2 RAT
Arechclient2.
-
SectopRAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-