General
-
Target
e21ea1ce6faa67758c820372736df655dbf70f05928d93f754dc1e01fd15b618.exe
-
Size
366KB
-
Sample
240511-celj8afa5z
-
MD5
ded2c2964f21cb0f3b993197267fb5d0
-
SHA1
e5ae61b319aba414f857d91ed33118146e1dcf6e
-
SHA256
e21ea1ce6faa67758c820372736df655dbf70f05928d93f754dc1e01fd15b618
-
SHA512
4335e720fe3e9bdce2c01544e7aedbdeb4f1bb913106759aae5bc0cb212e3a917af89f11b27f7d593a039140613ee383fc35b483c5d6509ab92fccf462dc79a1
-
SSDEEP
6144:OumbY5CsTONMI5+dcIIMprOeXcoEo7f6Z1:OFEQhmI5mtDdOe1EoOZ1
Static task
static1
Behavioral task
behavioral1
Sample
e21ea1ce6faa67758c820372736df655dbf70f05928d93f754dc1e01fd15b618.exe
Resource
win7-20240220-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
e21ea1ce6faa67758c820372736df655dbf70f05928d93f754dc1e01fd15b618.exe
-
Size
366KB
-
MD5
ded2c2964f21cb0f3b993197267fb5d0
-
SHA1
e5ae61b319aba414f857d91ed33118146e1dcf6e
-
SHA256
e21ea1ce6faa67758c820372736df655dbf70f05928d93f754dc1e01fd15b618
-
SHA512
4335e720fe3e9bdce2c01544e7aedbdeb4f1bb913106759aae5bc0cb212e3a917af89f11b27f7d593a039140613ee383fc35b483c5d6509ab92fccf462dc79a1
-
SSDEEP
6144:OumbY5CsTONMI5+dcIIMprOeXcoEo7f6Z1:OFEQhmI5mtDdOe1EoOZ1
-
Detect ZGRat V1
-
Detect binaries embedding considerable number of MFA browser extension IDs.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects encrypted or obfuscated .NET executables
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-