General
-
Target
2a8f26264a310a366dfd4c816d2d38ff36bcaf088051db5b18472784c80cfaf5
-
Size
411KB
-
Sample
240329-aadmpscg26
-
MD5
25cbe0fb8332e918afa95086aa56b880
-
SHA1
c1919f62324339b8aedd23fb5fdc5a3a0b968018
-
SHA256
2a8f26264a310a366dfd4c816d2d38ff36bcaf088051db5b18472784c80cfaf5
-
SHA512
50e6984e1144bc6844cc961842943905cc0db56d8909244c9e204a8db627f361f9ddc696d1c768c6806a70cf8a12dcd04e54a49180385fc36847cbd68848492e
-
SSDEEP
6144:GT5x3TR7tNkZ0NCMyM3BUnK4vkr+8JdObgOtWRPezdS8RWSmBUH/1/TAkXCI:+dt7tGoFyDnd8i8dojz0wBAkSI
Static task
static1
Behavioral task
behavioral1
Sample
2a8f26264a310a366dfd4c816d2d38ff36bcaf088051db5b18472784c80cfaf5.exe
Resource
win10v2004-20240319-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
2a8f26264a310a366dfd4c816d2d38ff36bcaf088051db5b18472784c80cfaf5
-
Size
411KB
-
MD5
25cbe0fb8332e918afa95086aa56b880
-
SHA1
c1919f62324339b8aedd23fb5fdc5a3a0b968018
-
SHA256
2a8f26264a310a366dfd4c816d2d38ff36bcaf088051db5b18472784c80cfaf5
-
SHA512
50e6984e1144bc6844cc961842943905cc0db56d8909244c9e204a8db627f361f9ddc696d1c768c6806a70cf8a12dcd04e54a49180385fc36847cbd68848492e
-
SSDEEP
6144:GT5x3TR7tNkZ0NCMyM3BUnK4vkr+8JdObgOtWRPezdS8RWSmBUH/1/TAkXCI:+dt7tGoFyDnd8i8dojz0wBAkSI
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-