General
-
Target
5b6626d7475ea918ab383b130e556cd0fdc9673845000e4316e94cdc4209da63
-
Size
368KB
-
Sample
240509-1t23hsbh76
-
MD5
b8aed504bddd0561e3d39aa6415a0f33
-
SHA1
b9bbdaa4a94bc140e94030992a12f879926e6e79
-
SHA256
5b6626d7475ea918ab383b130e556cd0fdc9673845000e4316e94cdc4209da63
-
SHA512
ae57aaf0bd154aa2b4c3452b48b0401d16512b6ceac4638bc1677569149977efe1f77125bef7459802e948acd6853f30fe921785fc9af255cf7bb43ed4af7dd0
-
SSDEEP
6144:mQLsPnj9HcQoscXDIkJUVmPdKTfVvvIFGg1w8c4lZNTpj1:DLsRxoscIeUMVCNX2Vw2lTpj1
Static task
static1
Behavioral task
behavioral1
Sample
5b6626d7475ea918ab383b130e556cd0fdc9673845000e4316e94cdc4209da63.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
5b6626d7475ea918ab383b130e556cd0fdc9673845000e4316e94cdc4209da63
-
Size
368KB
-
MD5
b8aed504bddd0561e3d39aa6415a0f33
-
SHA1
b9bbdaa4a94bc140e94030992a12f879926e6e79
-
SHA256
5b6626d7475ea918ab383b130e556cd0fdc9673845000e4316e94cdc4209da63
-
SHA512
ae57aaf0bd154aa2b4c3452b48b0401d16512b6ceac4638bc1677569149977efe1f77125bef7459802e948acd6853f30fe921785fc9af255cf7bb43ed4af7dd0
-
SSDEEP
6144:mQLsPnj9HcQoscXDIkJUVmPdKTfVvvIFGg1w8c4lZNTpj1:DLsRxoscIeUMVCNX2Vw2lTpj1
-
Detect ZGRat V1
-
Detect binaries embedding considerable number of MFA browser extension IDs.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects encrypted or obfuscated .NET executables
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-