General
-
Target
ba09e978c1394106640e457098ae7e5ad89105a7a8177b0d64696a448d843479
-
Size
445KB
-
Sample
240408-s9g4aagd7x
-
MD5
05a368d3b38c7bca417ed477621e575c
-
SHA1
c17bbab919c5a13cf10af46545911a2df6ab326d
-
SHA256
ba09e978c1394106640e457098ae7e5ad89105a7a8177b0d64696a448d843479
-
SHA512
c8a9813471fd320c8ea6a44a131d6a58d86d3dc29d45fc6138ec169d45f4e6119b44d158ed079955f7ffa33710ddf984df96bf42ec628bb7788dd5b4dc9c42c3
-
SSDEEP
12288:/kjVghmMqVHTW/4TypqkTAUOzDtmteV3r:YMqdpTyVLKAteV3r
Static task
static1
Behavioral task
behavioral1
Sample
ba09e978c1394106640e457098ae7e5ad89105a7a8177b0d64696a448d843479.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
ba09e978c1394106640e457098ae7e5ad89105a7a8177b0d64696a448d843479
-
Size
445KB
-
MD5
05a368d3b38c7bca417ed477621e575c
-
SHA1
c17bbab919c5a13cf10af46545911a2df6ab326d
-
SHA256
ba09e978c1394106640e457098ae7e5ad89105a7a8177b0d64696a448d843479
-
SHA512
c8a9813471fd320c8ea6a44a131d6a58d86d3dc29d45fc6138ec169d45f4e6119b44d158ed079955f7ffa33710ddf984df96bf42ec628bb7788dd5b4dc9c42c3
-
SSDEEP
12288:/kjVghmMqVHTW/4TypqkTAUOzDtmteV3r:YMqdpTyVLKAteV3r
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-