General
-
Target
91f2dfdf9d688737d07ae80174d5e6a30f6147ce39ebe437ac89460ebdd8d114
-
Size
434KB
-
Sample
240506-2tz4laeh6w
-
MD5
149677290aa8404040c2f2ec8c285e21
-
SHA1
87e8011dc4e5650043062ef9f53de7a4a0531f1d
-
SHA256
91f2dfdf9d688737d07ae80174d5e6a30f6147ce39ebe437ac89460ebdd8d114
-
SHA512
d14a49d2698786fe8b7361c349937f319b613b8be8c579ce641fe2786031ec789cdd6c8b9f00d1cd0729662fab30aedba5885f262dae93dbfaeb0dc11bbce12a
-
SSDEEP
6144:YjCWCQdVWjXWRSltCvyKN51/jFU+piWhXCS4W6N2sPyOG+V81t6xjl:u5/WMPZ1/jFU+pi8XD6NUD8xjl
Static task
static1
Behavioral task
behavioral1
Sample
91f2dfdf9d688737d07ae80174d5e6a30f6147ce39ebe437ac89460ebdd8d114.exe
Resource
win7-20240220-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
91f2dfdf9d688737d07ae80174d5e6a30f6147ce39ebe437ac89460ebdd8d114
-
Size
434KB
-
MD5
149677290aa8404040c2f2ec8c285e21
-
SHA1
87e8011dc4e5650043062ef9f53de7a4a0531f1d
-
SHA256
91f2dfdf9d688737d07ae80174d5e6a30f6147ce39ebe437ac89460ebdd8d114
-
SHA512
d14a49d2698786fe8b7361c349937f319b613b8be8c579ce641fe2786031ec789cdd6c8b9f00d1cd0729662fab30aedba5885f262dae93dbfaeb0dc11bbce12a
-
SSDEEP
6144:YjCWCQdVWjXWRSltCvyKN51/jFU+piWhXCS4W6N2sPyOG+V81t6xjl:u5/WMPZ1/jFU+pi8XD6NUD8xjl
-
Detect ZGRat V1
-
Detects Arechclient2 RAT
Arechclient2.
-
SectopRAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-