General
-
Target
2c5fd081ee26df4ed8661227f883110c8e9c27248cd54fa0c4cc630363b5ad25
-
Size
430KB
-
Sample
240403-p857yadd9y
-
MD5
202d74fd98a27eb65f021c9d6f481cd4
-
SHA1
d171fadc3561c97c65b7f9ec9a86bb10c10c556d
-
SHA256
2c5fd081ee26df4ed8661227f883110c8e9c27248cd54fa0c4cc630363b5ad25
-
SHA512
d1a86d4e8dec33bf20483d55caf3d21b2a4359da2f2eba41c71250579507a0cb1769cac2f44effc4e820e438cc01afd42b006b6eaeac8ac93e7a617bd26ff474
-
SSDEEP
6144:UTK1ILK/x9y4dpYsCgKIbf6hmGbsfBmIfMM0xrEWKJtBTGD2kef:UTbLK/zykYs/Ko8mLpbfMhrErRM2kef
Static task
static1
Behavioral task
behavioral1
Sample
2c5fd081ee26df4ed8661227f883110c8e9c27248cd54fa0c4cc630363b5ad25.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
2c5fd081ee26df4ed8661227f883110c8e9c27248cd54fa0c4cc630363b5ad25
-
Size
430KB
-
MD5
202d74fd98a27eb65f021c9d6f481cd4
-
SHA1
d171fadc3561c97c65b7f9ec9a86bb10c10c556d
-
SHA256
2c5fd081ee26df4ed8661227f883110c8e9c27248cd54fa0c4cc630363b5ad25
-
SHA512
d1a86d4e8dec33bf20483d55caf3d21b2a4359da2f2eba41c71250579507a0cb1769cac2f44effc4e820e438cc01afd42b006b6eaeac8ac93e7a617bd26ff474
-
SSDEEP
6144:UTK1ILK/x9y4dpYsCgKIbf6hmGbsfBmIfMM0xrEWKJtBTGD2kef:UTbLK/zykYs/Ko8mLpbfMhrErRM2kef
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-