General
-
Target
6bea74bd9d96718e04955348bb175fc00018d7e19b94b764fb987702694e6a0f
-
Size
434KB
-
Sample
240502-b79xvadf2s
-
MD5
a8ddb720d9e97fb0aa4dd54e8e55b971
-
SHA1
3797eafecfd3be08f97741886440c7a6a0ddfc4e
-
SHA256
6bea74bd9d96718e04955348bb175fc00018d7e19b94b764fb987702694e6a0f
-
SHA512
3cb1fae111027cc00f49fd8e293bcf7ac49f64500d82de810e3aef80deae7d14adb41bdcc0539b68f3aa925fbca43fb0772501fe3d1dd78c1fc9d2c890cced1d
-
SSDEEP
6144:YjCWCQdVWjXWRSltCvyKN51/jFU+piWhXCS4W6N2sPyOG+V81t6xjo:u5/WMPZ1/jFU+pi8XD6NUD8xjo
Static task
static1
Behavioral task
behavioral1
Sample
6bea74bd9d96718e04955348bb175fc00018d7e19b94b764fb987702694e6a0f.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
6bea74bd9d96718e04955348bb175fc00018d7e19b94b764fb987702694e6a0f
-
Size
434KB
-
MD5
a8ddb720d9e97fb0aa4dd54e8e55b971
-
SHA1
3797eafecfd3be08f97741886440c7a6a0ddfc4e
-
SHA256
6bea74bd9d96718e04955348bb175fc00018d7e19b94b764fb987702694e6a0f
-
SHA512
3cb1fae111027cc00f49fd8e293bcf7ac49f64500d82de810e3aef80deae7d14adb41bdcc0539b68f3aa925fbca43fb0772501fe3d1dd78c1fc9d2c890cced1d
-
SSDEEP
6144:YjCWCQdVWjXWRSltCvyKN51/jFU+piWhXCS4W6N2sPyOG+V81t6xjo:u5/WMPZ1/jFU+pi8XD6NUD8xjo
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-