General
-
Target
3af0ce733eb180c167d348a987847ab374487def7fff4136326818e53a61db42
-
Size
378KB
-
Sample
240329-qjyx1ahd5w
-
MD5
e59ad382ebe9af3c0c747009e860a171
-
SHA1
64173991a52a1916c7760a02c687d4685653b670
-
SHA256
3af0ce733eb180c167d348a987847ab374487def7fff4136326818e53a61db42
-
SHA512
5431adb8ea1c75d6569ca8743614c9c45e8bb1f00e0218f868c859bdf5230c09d0a8686394d925158ba992f942a1e07c32ff08fd77aa4f7cdb348c6ff6cbee42
-
SSDEEP
6144:AwSQES4tWjmeWeWhDwpP1b9GdhDmeqtEuvKJpBLX1tbLUpok7F:RdES40jmeWypP1xGdhZiEnpBLX1tGVF
Static task
static1
Behavioral task
behavioral1
Sample
3af0ce733eb180c167d348a987847ab374487def7fff4136326818e53a61db42.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
3af0ce733eb180c167d348a987847ab374487def7fff4136326818e53a61db42
-
Size
378KB
-
MD5
e59ad382ebe9af3c0c747009e860a171
-
SHA1
64173991a52a1916c7760a02c687d4685653b670
-
SHA256
3af0ce733eb180c167d348a987847ab374487def7fff4136326818e53a61db42
-
SHA512
5431adb8ea1c75d6569ca8743614c9c45e8bb1f00e0218f868c859bdf5230c09d0a8686394d925158ba992f942a1e07c32ff08fd77aa4f7cdb348c6ff6cbee42
-
SSDEEP
6144:AwSQES4tWjmeWeWhDwpP1b9GdhDmeqtEuvKJpBLX1tbLUpok7F:RdES40jmeWypP1xGdhZiEnpBLX1tGVF
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-