Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-01-2025 16:25
Behavioral task
behavioral1
Sample
Release/Stub/DestinyClient.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Release/Stub/DestinyClient.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Release/ZeroTrace Stealer.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Release/ZeroTrace Stealer.exe
Resource
win10v2004-20250129-en
General
-
Target
Release/ZeroTrace Stealer.exe
-
Size
92.1MB
-
MD5
3663dac498a652e088a574306a9e650b
-
SHA1
a0c1e6ca04379a352b1ada75122685f37cadd6f5
-
SHA256
8fed2734ddc22f9076022f32dcfa5f82aeddb392072d0ecaf1d800543d36f3fd
-
SHA512
b31aba8110ccfb2d6cbdfc63be4883e5a2bb1967431b090c9a8da52ac6ef457bd8c22721846566faebb3d590e0c9382bdb3cec136d1cdd6b0017c428112f3b0f
-
SSDEEP
1572864:SgihGf71kr5fuvnZ9q2l+zPDPi6YMaNyQrbNJX0UyFMEO2NkNXFhxwCwM:SgihGBkr5fuvnZ9q2l+z7Pi/MP0f2ZOS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZeroTrace Stealer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1756 ZeroTrace Stealer.exe 1756 ZeroTrace Stealer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1756 ZeroTrace Stealer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1756 ZeroTrace Stealer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1756 ZeroTrace Stealer.exe 1756 ZeroTrace Stealer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Release\ZeroTrace Stealer.exe"C:\Users\Admin\AppData\Local\Temp\Release\ZeroTrace Stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1756