General
-
Target
fd68be9a09d98a548ff408b29616b491ba6399c0e1e4ea4ee4647162be7fecf4
-
Size
430KB
-
Sample
240403-p9yjgsdh55
-
MD5
70b94c8d299b4c9a9e29aa840b67c920
-
SHA1
a36e0e2472ae4dd41687dce8de78b4004a1360a6
-
SHA256
fd68be9a09d98a548ff408b29616b491ba6399c0e1e4ea4ee4647162be7fecf4
-
SHA512
313f52894c3913634c9cf69b09408d8604f9591613053b3cd6575a0fc325abc76a6e2f18e4180dbeb00fab5b0ca62b11132f4fca599d247f5b06a7495a19cffa
-
SSDEEP
6144:UTK1ILK/x9y4dpYsCgKIbf6hmGbsfBmIfMM0xrEWKJtBTGD2kee:UTbLK/zykYs/Ko8mLpbfMhrErRM2kee
Static task
static1
Behavioral task
behavioral1
Sample
fd68be9a09d98a548ff408b29616b491ba6399c0e1e4ea4ee4647162be7fecf4.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
fd68be9a09d98a548ff408b29616b491ba6399c0e1e4ea4ee4647162be7fecf4
-
Size
430KB
-
MD5
70b94c8d299b4c9a9e29aa840b67c920
-
SHA1
a36e0e2472ae4dd41687dce8de78b4004a1360a6
-
SHA256
fd68be9a09d98a548ff408b29616b491ba6399c0e1e4ea4ee4647162be7fecf4
-
SHA512
313f52894c3913634c9cf69b09408d8604f9591613053b3cd6575a0fc325abc76a6e2f18e4180dbeb00fab5b0ca62b11132f4fca599d247f5b06a7495a19cffa
-
SSDEEP
6144:UTK1ILK/x9y4dpYsCgKIbf6hmGbsfBmIfMM0xrEWKJtBTGD2kee:UTbLK/zykYs/Ko8mLpbfMhrErRM2kee
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-