General
-
Target
f3ccdc820e1d56d3823fa7a9c074413b56940a48ff8ec5bfa11e601825753554
-
Size
411KB
-
Sample
240329-aafr3acg27
-
MD5
64d762f221640075cd05d401454ece8e
-
SHA1
7351e5ded174e1985ebe1e189fb176f90c22c1f1
-
SHA256
f3ccdc820e1d56d3823fa7a9c074413b56940a48ff8ec5bfa11e601825753554
-
SHA512
5e3455993af4483f0e916dcdc92a4b02dabf8208a3be6e70c9ccbd557526cc833736549d5370690da8e0e9190257a942fcbc21bbc034d3c3a3c09b8593cb46bd
-
SSDEEP
6144:GT5x3TR7tNkZ0NCMyM3BUnK4vkr+8JdObgOtWRPezdS8RWSmBUH/1/TAkXCF:+dt7tGoFyDnd8i8dojz0wBAkSF
Static task
static1
Behavioral task
behavioral1
Sample
f3ccdc820e1d56d3823fa7a9c074413b56940a48ff8ec5bfa11e601825753554.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
f3ccdc820e1d56d3823fa7a9c074413b56940a48ff8ec5bfa11e601825753554
-
Size
411KB
-
MD5
64d762f221640075cd05d401454ece8e
-
SHA1
7351e5ded174e1985ebe1e189fb176f90c22c1f1
-
SHA256
f3ccdc820e1d56d3823fa7a9c074413b56940a48ff8ec5bfa11e601825753554
-
SHA512
5e3455993af4483f0e916dcdc92a4b02dabf8208a3be6e70c9ccbd557526cc833736549d5370690da8e0e9190257a942fcbc21bbc034d3c3a3c09b8593cb46bd
-
SSDEEP
6144:GT5x3TR7tNkZ0NCMyM3BUnK4vkr+8JdObgOtWRPezdS8RWSmBUH/1/TAkXCF:+dt7tGoFyDnd8i8dojz0wBAkSF
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-