General
-
Target
0ffd98ee730d075f964045eb2538fb640a816b9db9c20fba0b9a66fb52a7c068
-
Size
455KB
-
Sample
240507-2bpj5sbc2s
-
MD5
39f8e1c34c1a6e6aa1fa544a62f6153d
-
SHA1
4ff01ce75ce3062f960ff31c86f94d88632fce5a
-
SHA256
0ffd98ee730d075f964045eb2538fb640a816b9db9c20fba0b9a66fb52a7c068
-
SHA512
21512c4e99a7dbd3ed5d18733980e52c739304815f964f50c7e6b8ee205410e57bc8c56afa97cfe6c6dd7215cb6ab14c020d6cdbebbe69eef9318a2e90db01e9
-
SSDEEP
6144:/kQovcEzShy9BhYyKVPJq/URCX68fELkHlVAwmN8HGPq1Mv4qb4/V:8QoUgSUAnRCL8YHLAWH9eAU4/V
Static task
static1
Behavioral task
behavioral1
Sample
0ffd98ee730d075f964045eb2538fb640a816b9db9c20fba0b9a66fb52a7c068.exe
Resource
win7-20240215-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
0ffd98ee730d075f964045eb2538fb640a816b9db9c20fba0b9a66fb52a7c068
-
Size
455KB
-
MD5
39f8e1c34c1a6e6aa1fa544a62f6153d
-
SHA1
4ff01ce75ce3062f960ff31c86f94d88632fce5a
-
SHA256
0ffd98ee730d075f964045eb2538fb640a816b9db9c20fba0b9a66fb52a7c068
-
SHA512
21512c4e99a7dbd3ed5d18733980e52c739304815f964f50c7e6b8ee205410e57bc8c56afa97cfe6c6dd7215cb6ab14c020d6cdbebbe69eef9318a2e90db01e9
-
SSDEEP
6144:/kQovcEzShy9BhYyKVPJq/URCX68fELkHlVAwmN8HGPq1Mv4qb4/V:8QoUgSUAnRCL8YHLAWH9eAU4/V
-
Detect ZGRat V1
-
Detects Arechclient2 RAT
Arechclient2.
-
SectopRAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-