General
-
Target
1787b6ad4a484b9103dd80c56c3c38b94ea638efff196d7e05eacecec51454a4
-
Size
347KB
-
Sample
240429-pv1qasbb41
-
MD5
8cbb249cdad2ae39a85492c691939ffc
-
SHA1
9afd97156b1cefc6e0cd300623517d9d7c9dceee
-
SHA256
1787b6ad4a484b9103dd80c56c3c38b94ea638efff196d7e05eacecec51454a4
-
SHA512
d6a1173d3dc7f85eb1c4940f21c896b4a290d538b67450a3185fbd3552945f22642a83896380ebf8cdaed7818c62d2c16a84d1714061f7f2356ccbb40916f0d6
-
SSDEEP
6144:B0zWKrKBpVw9PVu+AJdTvClKgvkWJG1HYcVABLulAGeJa:ukfw9PqduMVW41HnWlqreJa
Static task
static1
Behavioral task
behavioral1
Sample
1787b6ad4a484b9103dd80c56c3c38b94ea638efff196d7e05eacecec51454a4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1787b6ad4a484b9103dd80c56c3c38b94ea638efff196d7e05eacecec51454a4.exe
Resource
win11-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
1787b6ad4a484b9103dd80c56c3c38b94ea638efff196d7e05eacecec51454a4
-
Size
347KB
-
MD5
8cbb249cdad2ae39a85492c691939ffc
-
SHA1
9afd97156b1cefc6e0cd300623517d9d7c9dceee
-
SHA256
1787b6ad4a484b9103dd80c56c3c38b94ea638efff196d7e05eacecec51454a4
-
SHA512
d6a1173d3dc7f85eb1c4940f21c896b4a290d538b67450a3185fbd3552945f22642a83896380ebf8cdaed7818c62d2c16a84d1714061f7f2356ccbb40916f0d6
-
SSDEEP
6144:B0zWKrKBpVw9PVu+AJdTvClKgvkWJG1HYcVABLulAGeJa:ukfw9PqduMVW41HnWlqreJa
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-