General
-
Target
0a19a631ae64cf292e75ec43133a69fa34707d89186a49507e1dcdd7fa029994
-
Size
403KB
-
Sample
240328-zq4lhagd3x
-
MD5
ff76e547bcfb3b90d18c8e31d2ddcdb5
-
SHA1
ff4fa2affdb1afb37f4fbc0f35fddf6c6dd19fed
-
SHA256
0a19a631ae64cf292e75ec43133a69fa34707d89186a49507e1dcdd7fa029994
-
SHA512
d5b45b05c6a1deffccec050198f05d2c0ac0f5c466daa7133aa8a7c39aeeafee70ef33a9b97ff47f58cc96e9d77deff098af9a1d93fd950ba09e6dcdb529c0a8
-
SSDEEP
6144:b7JtWEN7zckLbX/nAgWPncoF4VZHRRBMOzsMlEYzBZbKxk:Bc07zlfX/nJWPcA4VZb66sMlEcRGk
Static task
static1
Behavioral task
behavioral1
Sample
0a19a631ae64cf292e75ec43133a69fa34707d89186a49507e1dcdd7fa029994.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
0a19a631ae64cf292e75ec43133a69fa34707d89186a49507e1dcdd7fa029994
-
Size
403KB
-
MD5
ff76e547bcfb3b90d18c8e31d2ddcdb5
-
SHA1
ff4fa2affdb1afb37f4fbc0f35fddf6c6dd19fed
-
SHA256
0a19a631ae64cf292e75ec43133a69fa34707d89186a49507e1dcdd7fa029994
-
SHA512
d5b45b05c6a1deffccec050198f05d2c0ac0f5c466daa7133aa8a7c39aeeafee70ef33a9b97ff47f58cc96e9d77deff098af9a1d93fd950ba09e6dcdb529c0a8
-
SSDEEP
6144:b7JtWEN7zckLbX/nAgWPncoF4VZHRRBMOzsMlEYzBZbKxk:Bc07zlfX/nJWPcA4VZb66sMlEcRGk
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-