General
-
Target
fb0a2456478714c5117e6fea5cc9f4c8db4e58331f4562a1af5c0669fec667fd
-
Size
359KB
-
Sample
240404-ls4gmacd33
-
MD5
2d20cd64683222247ee607673dfba78c
-
SHA1
4fa462bf25da7a60e3d3db59e973d4b422e7cbb5
-
SHA256
fb0a2456478714c5117e6fea5cc9f4c8db4e58331f4562a1af5c0669fec667fd
-
SHA512
a7da43f69c0d3b8ffe1d03e8bec7bc014ecf8a35c098804dfefb92e4193ef17574f3d234eed6fb0ec37df8a8c713da101eefab6a53622a772321c02c523f2376
-
SSDEEP
6144:XnqaECNPTFkBgWFtBaNzFbwhkzp/LU++d0RIxgZk+mGMeja/K5+QEhIo:6a9NPTF8LFt6Jvzp/L2+Ixp1Gxj4KihN
Static task
static1
Behavioral task
behavioral1
Sample
fb0a2456478714c5117e6fea5cc9f4c8db4e58331f4562a1af5c0669fec667fd.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
fb0a2456478714c5117e6fea5cc9f4c8db4e58331f4562a1af5c0669fec667fd
-
Size
359KB
-
MD5
2d20cd64683222247ee607673dfba78c
-
SHA1
4fa462bf25da7a60e3d3db59e973d4b422e7cbb5
-
SHA256
fb0a2456478714c5117e6fea5cc9f4c8db4e58331f4562a1af5c0669fec667fd
-
SHA512
a7da43f69c0d3b8ffe1d03e8bec7bc014ecf8a35c098804dfefb92e4193ef17574f3d234eed6fb0ec37df8a8c713da101eefab6a53622a772321c02c523f2376
-
SSDEEP
6144:XnqaECNPTFkBgWFtBaNzFbwhkzp/LU++d0RIxgZk+mGMeja/K5+QEhIo:6a9NPTF8LFt6Jvzp/L2+Ixp1Gxj4KihN
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-