General
-
Target
0c388a23f83195b2d5926cdd18d47e8ca73f8e61dff319eea784e837605de894
-
Size
419KB
-
Sample
240505-gzxv7scg27
-
MD5
99723fe72e278b5826ea3ee02e386f42
-
SHA1
d5ec80580958228bbdffabe7ee703e67f7cebe6f
-
SHA256
0c388a23f83195b2d5926cdd18d47e8ca73f8e61dff319eea784e837605de894
-
SHA512
d96a8d21b6c16cc6875362fc461b4c2b779ce1b0a863b9a07bf359cbe2a207450e0f9d0432d52a9cfec55900cb7eae433406e90f59286b9bcf7029216d699865
-
SSDEEP
6144:zL80j2r/8VkaDEjaX1f+x9zfSvTz9HHuI6M:zL80arWk6XOD89niM
Static task
static1
Behavioral task
behavioral1
Sample
0c388a23f83195b2d5926cdd18d47e8ca73f8e61dff319eea784e837605de894.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
0c388a23f83195b2d5926cdd18d47e8ca73f8e61dff319eea784e837605de894
-
Size
419KB
-
MD5
99723fe72e278b5826ea3ee02e386f42
-
SHA1
d5ec80580958228bbdffabe7ee703e67f7cebe6f
-
SHA256
0c388a23f83195b2d5926cdd18d47e8ca73f8e61dff319eea784e837605de894
-
SHA512
d96a8d21b6c16cc6875362fc461b4c2b779ce1b0a863b9a07bf359cbe2a207450e0f9d0432d52a9cfec55900cb7eae433406e90f59286b9bcf7029216d699865
-
SSDEEP
6144:zL80j2r/8VkaDEjaX1f+x9zfSvTz9HHuI6M:zL80arWk6XOD89niM
-
Detect ZGRat V1
-
SectopRAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-