General
-
Target
1fbbc76f4a86d65003043a2ea5d731afc4ea77beac14055cb8aebfd36b5fbf88
-
Size
428KB
-
Sample
240403-lvn5qabg4x
-
MD5
cdecd00c05aab53b27e3bd2312180146
-
SHA1
60e3e877195f7d491ac57efb81d80b9db7ccbb2a
-
SHA256
1fbbc76f4a86d65003043a2ea5d731afc4ea77beac14055cb8aebfd36b5fbf88
-
SHA512
e9aa1dc04f30124efcd47809963f61f41cea51a9490bcd6cfe14ae502fa89c0c7cf844e31fb74d73efca68c2f6dd9bb05df81487d9235d2eeeb01561292668d2
-
SSDEEP
6144:u2gMYfrVIRqhFcje+qC47pNs6G6u2PcHpzGeAQ9BTOPEI:u2+frVVhevql7/FPsHpdOPEI
Static task
static1
Behavioral task
behavioral1
Sample
1fbbc76f4a86d65003043a2ea5d731afc4ea77beac14055cb8aebfd36b5fbf88.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
1fbbc76f4a86d65003043a2ea5d731afc4ea77beac14055cb8aebfd36b5fbf88
-
Size
428KB
-
MD5
cdecd00c05aab53b27e3bd2312180146
-
SHA1
60e3e877195f7d491ac57efb81d80b9db7ccbb2a
-
SHA256
1fbbc76f4a86d65003043a2ea5d731afc4ea77beac14055cb8aebfd36b5fbf88
-
SHA512
e9aa1dc04f30124efcd47809963f61f41cea51a9490bcd6cfe14ae502fa89c0c7cf844e31fb74d73efca68c2f6dd9bb05df81487d9235d2eeeb01561292668d2
-
SSDEEP
6144:u2gMYfrVIRqhFcje+qC47pNs6G6u2PcHpzGeAQ9BTOPEI:u2+frVVhevql7/FPsHpdOPEI
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-