General
-
Target
778894874a87d4ff7cfee0321734d6ac22758f4523e5452ceaaa0aca54d8c809
-
Size
428KB
-
Sample
240403-lwchbacc47
-
MD5
c12575237c2ae9bb102b5912e848fb02
-
SHA1
58cf046737bcfafd5de027482fc5fe485298d36c
-
SHA256
778894874a87d4ff7cfee0321734d6ac22758f4523e5452ceaaa0aca54d8c809
-
SHA512
1f48999feb8703afda0fa4e47684a3c68963eb7df0d1c3c3f61444967e4f30427ecd9cb1dc25f6aa3c5c231f043357942fc0e09a4a5d721a54395112740fd611
-
SSDEEP
6144:u2gMYfrVIRqhFcje+qC47pNs6G6u2PcHpzGeAQ9BTOPEE:u2+frVVhevql7/FPsHpdOPEE
Static task
static1
Behavioral task
behavioral1
Sample
778894874a87d4ff7cfee0321734d6ac22758f4523e5452ceaaa0aca54d8c809.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
778894874a87d4ff7cfee0321734d6ac22758f4523e5452ceaaa0aca54d8c809
-
Size
428KB
-
MD5
c12575237c2ae9bb102b5912e848fb02
-
SHA1
58cf046737bcfafd5de027482fc5fe485298d36c
-
SHA256
778894874a87d4ff7cfee0321734d6ac22758f4523e5452ceaaa0aca54d8c809
-
SHA512
1f48999feb8703afda0fa4e47684a3c68963eb7df0d1c3c3f61444967e4f30427ecd9cb1dc25f6aa3c5c231f043357942fc0e09a4a5d721a54395112740fd611
-
SSDEEP
6144:u2gMYfrVIRqhFcje+qC47pNs6G6u2PcHpzGeAQ9BTOPEE:u2+frVVhevql7/FPsHpdOPEE
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-