General
-
Target
tmp
-
Size
454KB
-
Sample
240407-y775ksdf4v
-
MD5
4492c0fed06f47b4e844633e7b56293c
-
SHA1
c072235414b249c89d2fe05691c2c0af36e54bda
-
SHA256
711255b88ff35cdd174c920672c0ebc2da771f5ba47b7afc1e10666e6bd351ee
-
SHA512
bff79c233a9e7459cdd10c5814e511369fa6e3f737ded6ea4ebacbb51fdc012c1bfa01f30e38125db8ea15b809fe6419d8af7b9d6305c7400ae64ae2bfb889b8
-
SSDEEP
12288:2iB9S1zi63i/LYjQogh7cz3EP4Fn4IWneiS6U:2irSI63iTYkogh4DlKrU
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231129-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
tmp
-
Size
454KB
-
MD5
4492c0fed06f47b4e844633e7b56293c
-
SHA1
c072235414b249c89d2fe05691c2c0af36e54bda
-
SHA256
711255b88ff35cdd174c920672c0ebc2da771f5ba47b7afc1e10666e6bd351ee
-
SHA512
bff79c233a9e7459cdd10c5814e511369fa6e3f737ded6ea4ebacbb51fdc012c1bfa01f30e38125db8ea15b809fe6419d8af7b9d6305c7400ae64ae2bfb889b8
-
SSDEEP
12288:2iB9S1zi63i/LYjQogh7cz3EP4Fn4IWneiS6U:2irSI63iTYkogh4DlKrU
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-