General
-
Target
bbf4239f42f53e8b6e1dafc178bad44d1ef109ad51a0b5e5a22a0b831a7407a2
-
Size
380KB
-
Sample
240501-pjwl7sgg79
-
MD5
0d47731cf5722ac576b27d591d6534a7
-
SHA1
edc50b8f3e6ab722301a8a9cd5ee6e305fb84245
-
SHA256
bbf4239f42f53e8b6e1dafc178bad44d1ef109ad51a0b5e5a22a0b831a7407a2
-
SHA512
6681014cd2416b4e023296749d83944446a5fc41aa43265ddeb255a2e0f05979d391597790af30f9fdddb02b6f37123731efb6e831a072e2bdb29f664c2ef78b
-
SSDEEP
6144:RuE7FLKXiQUZO1WiXTLY4LCXr2UD9ztU8AYTUAcCeZQ0Sehb/:RuE7FS1eOtLY4LCb2UE87Qf6ehb/
Static task
static1
Behavioral task
behavioral1
Sample
bbf4239f42f53e8b6e1dafc178bad44d1ef109ad51a0b5e5a22a0b831a7407a2.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
bbf4239f42f53e8b6e1dafc178bad44d1ef109ad51a0b5e5a22a0b831a7407a2
-
Size
380KB
-
MD5
0d47731cf5722ac576b27d591d6534a7
-
SHA1
edc50b8f3e6ab722301a8a9cd5ee6e305fb84245
-
SHA256
bbf4239f42f53e8b6e1dafc178bad44d1ef109ad51a0b5e5a22a0b831a7407a2
-
SHA512
6681014cd2416b4e023296749d83944446a5fc41aa43265ddeb255a2e0f05979d391597790af30f9fdddb02b6f37123731efb6e831a072e2bdb29f664c2ef78b
-
SSDEEP
6144:RuE7FLKXiQUZO1WiXTLY4LCXr2UD9ztU8AYTUAcCeZQ0Sehb/:RuE7FS1eOtLY4LCb2UE87Qf6ehb/
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-