General
-
Target
c8b679d3c8473b7aa60c6d7e8e338584fc166bccf5466fe1ba02174e820782ea
-
Size
445KB
-
Sample
240408-l1mh3shg61
-
MD5
abd1eaa6c799df6729abcf182f2b52e0
-
SHA1
d5f507ac3c66fd8c6d72346d29f3ad216226de4d
-
SHA256
c8b679d3c8473b7aa60c6d7e8e338584fc166bccf5466fe1ba02174e820782ea
-
SHA512
9db6679a63f76620e223071fb35ba23022620b042a53b1994c2dbef4b688a79710f458d72a8acfcc970108d0f5fd8960e2c7be29bf42b9b97b7dd9a4ebd43500
-
SSDEEP
6144:7OhIDDNXnKWOuBVdi1KuvL5MAI0o0XzsAML3G8oSow2TQxm2umtSRV:7OhIDDNXnV3BjUK1ij3qtiV
Static task
static1
Behavioral task
behavioral1
Sample
c8b679d3c8473b7aa60c6d7e8e338584fc166bccf5466fe1ba02174e820782ea.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
c8b679d3c8473b7aa60c6d7e8e338584fc166bccf5466fe1ba02174e820782ea
-
Size
445KB
-
MD5
abd1eaa6c799df6729abcf182f2b52e0
-
SHA1
d5f507ac3c66fd8c6d72346d29f3ad216226de4d
-
SHA256
c8b679d3c8473b7aa60c6d7e8e338584fc166bccf5466fe1ba02174e820782ea
-
SHA512
9db6679a63f76620e223071fb35ba23022620b042a53b1994c2dbef4b688a79710f458d72a8acfcc970108d0f5fd8960e2c7be29bf42b9b97b7dd9a4ebd43500
-
SSDEEP
6144:7OhIDDNXnKWOuBVdi1KuvL5MAI0o0XzsAML3G8oSow2TQxm2umtSRV:7OhIDDNXnV3BjUK1ij3qtiV
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-