General
-
Target
989b904faba9a34be744477ce7730e1c84515ba7114f955cc5bda329d5b2e4c8
-
Size
435KB
-
Sample
240507-3kl12sha99
-
MD5
90ebf993cfa5d02f1ec8ff15a171234f
-
SHA1
98027332e2b56efbed5b95f2e13b078f295441b7
-
SHA256
989b904faba9a34be744477ce7730e1c84515ba7114f955cc5bda329d5b2e4c8
-
SHA512
e510010a0dd0623581fecace7437430d13b7179259832da9204401f7f27c75b1f9c29c9078b1fff6dc1c39e0cea085986fa291d0e01c004782846703cca231b5
-
SSDEEP
6144:gnYDXuyMLH7A6nRXxOZfktYODo8+QpaAKOGP1OE98aeAfBw/6l:S42LH7LxOZf+LZrGPrq/6l
Static task
static1
Behavioral task
behavioral1
Sample
989b904faba9a34be744477ce7730e1c84515ba7114f955cc5bda329d5b2e4c8.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
989b904faba9a34be744477ce7730e1c84515ba7114f955cc5bda329d5b2e4c8
-
Size
435KB
-
MD5
90ebf993cfa5d02f1ec8ff15a171234f
-
SHA1
98027332e2b56efbed5b95f2e13b078f295441b7
-
SHA256
989b904faba9a34be744477ce7730e1c84515ba7114f955cc5bda329d5b2e4c8
-
SHA512
e510010a0dd0623581fecace7437430d13b7179259832da9204401f7f27c75b1f9c29c9078b1fff6dc1c39e0cea085986fa291d0e01c004782846703cca231b5
-
SSDEEP
6144:gnYDXuyMLH7A6nRXxOZfktYODo8+QpaAKOGP1OE98aeAfBw/6l:S42LH7LxOZf+LZrGPrq/6l
-
Detect ZGRat V1
-
Detects Arechclient2 RAT
Arechclient2.
-
SectopRAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-