General
-
Target
Zentra 1.0.exe
-
Size
16.5MB
-
Sample
240719-mga7dazcrb
-
MD5
3d997e2b7c8426de181f40eae0ef1e82
-
SHA1
13744398cb732cf973c497e592f93a7a9d5f9510
-
SHA256
764ac07dbb5091c6c1d83b67f8f009a0bc1bb7f96db3b3461ad5175c466e0535
-
SHA512
3a22276ae7208d27c6ce96064cd00c46a67a1644f1d80b291154e38880eefaa386fba0df835b2f31ee3a71c03188cf7be1958038cb05a30629d8dc9e4040c9b4
-
SSDEEP
393216:Ju7L/jpUTLfhJjdQusl7Q+l9RoWOv+9faTwJAd9gvUq:JCLtUTLJRdQu2QGborvSitz
Behavioral task
behavioral1
Sample
Zentra 1.0.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
Zentra 1.0.exe
-
Size
16.5MB
-
MD5
3d997e2b7c8426de181f40eae0ef1e82
-
SHA1
13744398cb732cf973c497e592f93a7a9d5f9510
-
SHA256
764ac07dbb5091c6c1d83b67f8f009a0bc1bb7f96db3b3461ad5175c466e0535
-
SHA512
3a22276ae7208d27c6ce96064cd00c46a67a1644f1d80b291154e38880eefaa386fba0df835b2f31ee3a71c03188cf7be1958038cb05a30629d8dc9e4040c9b4
-
SSDEEP
393216:Ju7L/jpUTLfhJjdQusl7Q+l9RoWOv+9faTwJAd9gvUq:JCLtUTLJRdQu2QGborvSitz
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-