General
-
Target
ba718c34f1be4535e03cde6530407b4d87e326a9a9ad596ee38bf19d81e32e9d
-
Size
430KB
-
Sample
240403-x84ywaah45
-
MD5
e9c5c73a664eec1564ef4b71964f2811
-
SHA1
98cd3bd9ce0bc410389a9e442117cc63a6e7f9d6
-
SHA256
ba718c34f1be4535e03cde6530407b4d87e326a9a9ad596ee38bf19d81e32e9d
-
SHA512
54fd34fb56966cb831a4c72c2825fcfc8ce99a49d71f4b73eb4503c794ecf713ba734dec9de116d5d24640fff1c501302687d25059b9c0bb1a982f80cfefeae6
-
SSDEEP
12288:6cngs+cvhCpAa+RRwKNpqoz74/5D0qokyRo:6gJOf+RL5z74/5D0CyRo
Static task
static1
Behavioral task
behavioral1
Sample
ba718c34f1be4535e03cde6530407b4d87e326a9a9ad596ee38bf19d81e32e9d.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
ba718c34f1be4535e03cde6530407b4d87e326a9a9ad596ee38bf19d81e32e9d
-
Size
430KB
-
MD5
e9c5c73a664eec1564ef4b71964f2811
-
SHA1
98cd3bd9ce0bc410389a9e442117cc63a6e7f9d6
-
SHA256
ba718c34f1be4535e03cde6530407b4d87e326a9a9ad596ee38bf19d81e32e9d
-
SHA512
54fd34fb56966cb831a4c72c2825fcfc8ce99a49d71f4b73eb4503c794ecf713ba734dec9de116d5d24640fff1c501302687d25059b9c0bb1a982f80cfefeae6
-
SSDEEP
12288:6cngs+cvhCpAa+RRwKNpqoz74/5D0qokyRo:6gJOf+RL5z74/5D0CyRo
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-