General
-
Target
5d4a89493376479c5214962cb57243204c43b749a6e4c3398c159811a5731898
-
Size
419KB
-
Sample
240505-g3qw3ach33
-
MD5
61b45f5a9390fca6cae71e4d94c3e014
-
SHA1
27480268ceead1847cc60d23848f780e023b8d86
-
SHA256
5d4a89493376479c5214962cb57243204c43b749a6e4c3398c159811a5731898
-
SHA512
d117b086c804825a3491b057cc7a29bc874d738cac1941b659edd04d6f683190de8a3311a1706311050884f61862befc3465004e0313884aff74bec2d18c960f
-
SSDEEP
6144:zL80j2r/8VkaDEjaX1f+x9zfSvTz9HHuI6I:zL80arWk6XOD89niI
Static task
static1
Behavioral task
behavioral1
Sample
5d4a89493376479c5214962cb57243204c43b749a6e4c3398c159811a5731898.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
5d4a89493376479c5214962cb57243204c43b749a6e4c3398c159811a5731898
-
Size
419KB
-
MD5
61b45f5a9390fca6cae71e4d94c3e014
-
SHA1
27480268ceead1847cc60d23848f780e023b8d86
-
SHA256
5d4a89493376479c5214962cb57243204c43b749a6e4c3398c159811a5731898
-
SHA512
d117b086c804825a3491b057cc7a29bc874d738cac1941b659edd04d6f683190de8a3311a1706311050884f61862befc3465004e0313884aff74bec2d18c960f
-
SSDEEP
6144:zL80j2r/8VkaDEjaX1f+x9zfSvTz9HHuI6I:zL80arWk6XOD89niI
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-