General
-
Target
edcd9de4254f050ffa56e723be49c0c5.bin
-
Size
387KB
-
Sample
240509-d4hqasbb76
-
MD5
c8835a0335c368b0daf7dd421d788a52
-
SHA1
b79cb5d0e42cb50e57349092db3e4338e2092985
-
SHA256
166fbe093262a894127000d51aac0677a370cba01faad82120eee2f44a573d04
-
SHA512
46f7635424450933f03aa36d449b6619afd56ca50401577aa6506fa3ebb388fd2ac629e711df3453366b1e766b9d256949fda828f96212240e887a636b3a2e09
-
SSDEEP
6144:IaNnWCafEk9esvSzKFCYmKVEEJkyJtMnHQ66gMRx460OsvCXM6ukhSj3B0ZpSS7u:ICWCSB9/RFZRJn6x6Nw6Nsvk2GSON7u
Static task
static1
Behavioral task
behavioral1
Sample
0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3.exe
-
Size
409KB
-
MD5
edcd9de4254f050ffa56e723be49c0c5
-
SHA1
054c541726383f1d70572f72a83ad86061141d64
-
SHA256
0fe604088fc3cb6f07ba074b4100627239bd38456f256a9083f2e8e12dd82ad3
-
SHA512
aadf2f8fd82146c1174efe01261871caff89ba0ca3b18c6be77472609b8dbfa8b4c2b9d15968a7d423be9af0c79005311663478bd6d79fbcb87cf42a5bd20328
-
SSDEEP
12288:AiwMdowCeYkiyh9bGfD7NUwW1ROABchrj9j48Re9TY:AiwQowukiS4iwGROuqrj91
-
Detect ZGRat V1
-
Glupteba payload
-
Modifies boot configuration data using bcdedit
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
4