General
-
Target
63c74ffef5a2154afb3bd4ffa4b3178c48320deda57d312af52170ada7171b92
-
Size
445KB
-
Sample
240408-q5c8esae77
-
MD5
71609c270caf1eafdb8945c53890133a
-
SHA1
ab92396ca69ade59a43b7df6098f9ff6127addc7
-
SHA256
63c74ffef5a2154afb3bd4ffa4b3178c48320deda57d312af52170ada7171b92
-
SHA512
31c92bd8f69d863c4d57538e1f8d9329e8d3a04a9232c9e9d3d5b08e19860e1e3acaa1d82d3d1569105a6c87371c5ef60e506844f5e61339d66d4f779ed92b9c
-
SSDEEP
6144:pLXVMhmE9jyo07r/vsSiRicU4QKYg7u+Ee9dxbj2ZcBtl8v:ZXVMhmE9m1/vsRkKYg7WefZcSt2v
Static task
static1
Behavioral task
behavioral1
Sample
63c74ffef5a2154afb3bd4ffa4b3178c48320deda57d312af52170ada7171b92.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
63c74ffef5a2154afb3bd4ffa4b3178c48320deda57d312af52170ada7171b92
-
Size
445KB
-
MD5
71609c270caf1eafdb8945c53890133a
-
SHA1
ab92396ca69ade59a43b7df6098f9ff6127addc7
-
SHA256
63c74ffef5a2154afb3bd4ffa4b3178c48320deda57d312af52170ada7171b92
-
SHA512
31c92bd8f69d863c4d57538e1f8d9329e8d3a04a9232c9e9d3d5b08e19860e1e3acaa1d82d3d1569105a6c87371c5ef60e506844f5e61339d66d4f779ed92b9c
-
SSDEEP
6144:pLXVMhmE9jyo07r/vsSiRicU4QKYg7u+Ee9dxbj2ZcBtl8v:ZXVMhmE9m1/vsRkKYg7WefZcSt2v
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-