General
-
Target
e5f5de41cde0b1bb1fd6c3503d23067502a38771990f32f606d1d11189aff7c1
-
Size
467KB
-
Sample
240503-fsaxeshh77
-
MD5
9936fc01e3f3e52d4194a778525982b1
-
SHA1
0aa28c2210a7a86bf28883ca25be234f010f7319
-
SHA256
e5f5de41cde0b1bb1fd6c3503d23067502a38771990f32f606d1d11189aff7c1
-
SHA512
857260ceb88c9123181b7bf5c3dfb6d019051de4a226cf76c4d449d247b01a790b436f4d9a09e771f8691cd8ec3bbaca436dce0f4cfafb3e36f649c25f9324ce
-
SSDEEP
6144:Za9vU4yXWuTJaNO8C+qRHxLxFoOOak9kXRAUUHMUJpak2BenJJ37h1zxtI1v:Z86XWutJRHxL5ONyRAUs/J4k2yTiv
Static task
static1
Behavioral task
behavioral1
Sample
e5f5de41cde0b1bb1fd6c3503d23067502a38771990f32f606d1d11189aff7c1.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
e5f5de41cde0b1bb1fd6c3503d23067502a38771990f32f606d1d11189aff7c1
-
Size
467KB
-
MD5
9936fc01e3f3e52d4194a778525982b1
-
SHA1
0aa28c2210a7a86bf28883ca25be234f010f7319
-
SHA256
e5f5de41cde0b1bb1fd6c3503d23067502a38771990f32f606d1d11189aff7c1
-
SHA512
857260ceb88c9123181b7bf5c3dfb6d019051de4a226cf76c4d449d247b01a790b436f4d9a09e771f8691cd8ec3bbaca436dce0f4cfafb3e36f649c25f9324ce
-
SSDEEP
6144:Za9vU4yXWuTJaNO8C+qRHxLxFoOOak9kXRAUUHMUJpak2BenJJ37h1zxtI1v:Z86XWutJRHxL5ONyRAUs/J4k2yTiv
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-