General
-
Target
686ba1cf9a832443a0c2c315f0e088b01b30a271d2ba7864bd53610811e8f9f9
-
Size
419KB
-
Sample
240505-2s6jzsbe65
-
MD5
bcdf3ae4da165948b4920ef34e1957f0
-
SHA1
241c3851c1a17b821e88143e532289a8bbd0ab4e
-
SHA256
686ba1cf9a832443a0c2c315f0e088b01b30a271d2ba7864bd53610811e8f9f9
-
SHA512
df2bda7c5b0afe0ad8626ffc07a4273c0601e388680538bf5db63906beda0ffd44d8ce6abefe2c88ead3c2ee2b8b13915ae5c37dd209f2a55e59fb725d4137b1
-
SSDEEP
6144:adQDC9/gjoevDLvcjEgQvXr04KLq8pGYkmCuf8Tt46:adQDSojoevn4o04T8pGYkmCh46
Static task
static1
Behavioral task
behavioral1
Sample
686ba1cf9a832443a0c2c315f0e088b01b30a271d2ba7864bd53610811e8f9f9.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
686ba1cf9a832443a0c2c315f0e088b01b30a271d2ba7864bd53610811e8f9f9
-
Size
419KB
-
MD5
bcdf3ae4da165948b4920ef34e1957f0
-
SHA1
241c3851c1a17b821e88143e532289a8bbd0ab4e
-
SHA256
686ba1cf9a832443a0c2c315f0e088b01b30a271d2ba7864bd53610811e8f9f9
-
SHA512
df2bda7c5b0afe0ad8626ffc07a4273c0601e388680538bf5db63906beda0ffd44d8ce6abefe2c88ead3c2ee2b8b13915ae5c37dd209f2a55e59fb725d4137b1
-
SSDEEP
6144:adQDC9/gjoevDLvcjEgQvXr04KLq8pGYkmCuf8Tt46:adQDSojoevn4o04T8pGYkmCh46
-
Detect ZGRat V1
-
SectopRAT payload
-
Detect binaries embedding considerable number of MFA browser extension IDs.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects encrypted or obfuscated .NET executables
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-