General
-
Target
4056f0e7908ba711f94dc3d9b096f2508eeefe1700230453fd1cfc1d091905c9
-
Size
378KB
-
Sample
240329-jcpx7acd6z
-
MD5
59dba5618f9a586828c9a7ba21684ad2
-
SHA1
f80332c3396e161ba82e997a82039a8a422f1c74
-
SHA256
4056f0e7908ba711f94dc3d9b096f2508eeefe1700230453fd1cfc1d091905c9
-
SHA512
6ddf479b87ebdd4ab8d5da7cd531bf338b08872ef5ad38761948f3473c32e502866dc6326b5bc4d9f44752c2ead53541c78fb99c9c7bfbca5bb3529a144b2e81
-
SSDEEP
6144:u+2gTbjdyVFhRfToBbCtuyxajSuR64do+0L4U4Q/fVDaWoJV+MFZUdsjWyL:1TbjkVFb2CtukUR64700UbFDiZcRyL
Static task
static1
Behavioral task
behavioral1
Sample
4056f0e7908ba711f94dc3d9b096f2508eeefe1700230453fd1cfc1d091905c9.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
4056f0e7908ba711f94dc3d9b096f2508eeefe1700230453fd1cfc1d091905c9
-
Size
378KB
-
MD5
59dba5618f9a586828c9a7ba21684ad2
-
SHA1
f80332c3396e161ba82e997a82039a8a422f1c74
-
SHA256
4056f0e7908ba711f94dc3d9b096f2508eeefe1700230453fd1cfc1d091905c9
-
SHA512
6ddf479b87ebdd4ab8d5da7cd531bf338b08872ef5ad38761948f3473c32e502866dc6326b5bc4d9f44752c2ead53541c78fb99c9c7bfbca5bb3529a144b2e81
-
SSDEEP
6144:u+2gTbjdyVFhRfToBbCtuyxajSuR64do+0L4U4Q/fVDaWoJV+MFZUdsjWyL:1TbjkVFb2CtukUR64700UbFDiZcRyL
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-