General
-
Target
9152f85d31e23e6075121ce763ac0b0cd6244d29f8e84bc7b7e739f55de583e6
-
Size
359KB
-
Sample
240404-lsztfabg21
-
MD5
ebfc28d0f68e343474449e679227817d
-
SHA1
1f1019e3081ac2256d9bae25b9cccd73528a58bd
-
SHA256
9152f85d31e23e6075121ce763ac0b0cd6244d29f8e84bc7b7e739f55de583e6
-
SHA512
15cde2a3b3dada7772b042d5260f80bbc5bd232785a66e945e7dc1410ef5a92e7a1cc80f6fd7a6d7dc6a6deda47523d428e9eb5de06472a06451fecbcf121f47
-
SSDEEP
6144:XnqaECNPTFkBgWFtBaNzFbwhkzp/LU++d0RIxgZk+mGMeja/K5+QEhIl:6a9NPTF8LFt6Jvzp/L2+Ixp1Gxj4KihA
Static task
static1
Behavioral task
behavioral1
Sample
9152f85d31e23e6075121ce763ac0b0cd6244d29f8e84bc7b7e739f55de583e6.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
9152f85d31e23e6075121ce763ac0b0cd6244d29f8e84bc7b7e739f55de583e6
-
Size
359KB
-
MD5
ebfc28d0f68e343474449e679227817d
-
SHA1
1f1019e3081ac2256d9bae25b9cccd73528a58bd
-
SHA256
9152f85d31e23e6075121ce763ac0b0cd6244d29f8e84bc7b7e739f55de583e6
-
SHA512
15cde2a3b3dada7772b042d5260f80bbc5bd232785a66e945e7dc1410ef5a92e7a1cc80f6fd7a6d7dc6a6deda47523d428e9eb5de06472a06451fecbcf121f47
-
SSDEEP
6144:XnqaECNPTFkBgWFtBaNzFbwhkzp/LU++d0RIxgZk+mGMeja/K5+QEhIl:6a9NPTF8LFt6Jvzp/L2+Ixp1Gxj4KihA
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-