General
-
Target
84f083fb1cd2f3f999fbaf0a3f7424b1ee506809768ce71c148b725dc8005126
-
Size
380KB
-
Sample
240501-mnqkmsfb64
-
MD5
661d978b629d45ae1de4c4b31cf64715
-
SHA1
5983cc839e06a8a97e43803c8301ca36161640b1
-
SHA256
84f083fb1cd2f3f999fbaf0a3f7424b1ee506809768ce71c148b725dc8005126
-
SHA512
3559bcf9a4c45568bf83d10be06c8b5c5d472f20eebe60e90db3d33b08b0751f8af737a7609b6de61c60e6187013f48211f3faec7ce7de223b1264b280c9acc1
-
SSDEEP
6144:Lu3aFjMxdT64u9DBnDI6FY/swgs5jsbGGL2ESDxvPigwvE+P/:LuKFBDvYas5jsbnLABi5E+P/
Static task
static1
Behavioral task
behavioral1
Sample
84f083fb1cd2f3f999fbaf0a3f7424b1ee506809768ce71c148b725dc8005126.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
84f083fb1cd2f3f999fbaf0a3f7424b1ee506809768ce71c148b725dc8005126.exe
Resource
win11-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
84f083fb1cd2f3f999fbaf0a3f7424b1ee506809768ce71c148b725dc8005126
-
Size
380KB
-
MD5
661d978b629d45ae1de4c4b31cf64715
-
SHA1
5983cc839e06a8a97e43803c8301ca36161640b1
-
SHA256
84f083fb1cd2f3f999fbaf0a3f7424b1ee506809768ce71c148b725dc8005126
-
SHA512
3559bcf9a4c45568bf83d10be06c8b5c5d472f20eebe60e90db3d33b08b0751f8af737a7609b6de61c60e6187013f48211f3faec7ce7de223b1264b280c9acc1
-
SSDEEP
6144:Lu3aFjMxdT64u9DBnDI6FY/swgs5jsbGGL2ESDxvPigwvE+P/:LuKFBDvYas5jsbnLABi5E+P/
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-