General
-
Target
8d67a760c9a54cee8828ade63dc6c1b54c342757e7df2c0e44c31b32c822cf16
-
Size
430KB
-
Sample
240403-qajrqade31
-
MD5
fd2d8f0b90f6b24f89dfe6cfbca8db3d
-
SHA1
057a1cf84a67354f333b11ce921c1d43e4fc111f
-
SHA256
8d67a760c9a54cee8828ade63dc6c1b54c342757e7df2c0e44c31b32c822cf16
-
SHA512
f9d841e63b5e1f4745a0bc9273ef62a726b160097b0e1e21c678012a4cc026b743699d34f0025cd606f63edc1d22ad6219db7e48dc8fc4f6e3c4fd38cbecd07e
-
SSDEEP
6144:UTK1ILK/x9y4dpYsCgKIbf6hmGbsfBmIfMM0xrEWKJtBTGD2keb:UTbLK/zykYs/Ko8mLpbfMhrErRM2keb
Static task
static1
Behavioral task
behavioral1
Sample
8d67a760c9a54cee8828ade63dc6c1b54c342757e7df2c0e44c31b32c822cf16.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
8d67a760c9a54cee8828ade63dc6c1b54c342757e7df2c0e44c31b32c822cf16
-
Size
430KB
-
MD5
fd2d8f0b90f6b24f89dfe6cfbca8db3d
-
SHA1
057a1cf84a67354f333b11ce921c1d43e4fc111f
-
SHA256
8d67a760c9a54cee8828ade63dc6c1b54c342757e7df2c0e44c31b32c822cf16
-
SHA512
f9d841e63b5e1f4745a0bc9273ef62a726b160097b0e1e21c678012a4cc026b743699d34f0025cd606f63edc1d22ad6219db7e48dc8fc4f6e3c4fd38cbecd07e
-
SSDEEP
6144:UTK1ILK/x9y4dpYsCgKIbf6hmGbsfBmIfMM0xrEWKJtBTGD2keb:UTbLK/zykYs/Ko8mLpbfMhrErRM2keb
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-