General
-
Target
255321eb39794d7a32f3e1b2a1387061a2d138b503a2cf6827cf5766d025f7f9
-
Size
477KB
-
Sample
240410-sfgwesfc71
-
MD5
ddcefbf71a1a9fb9801dceb4d6722c39
-
SHA1
0f8b5785a5a445848271d5f03971b96670f74931
-
SHA256
255321eb39794d7a32f3e1b2a1387061a2d138b503a2cf6827cf5766d025f7f9
-
SHA512
2b43db79e7c350f780ed6ba2e216038cf988d9f7ace1c4a781625b770c61300390902054e0ae9d2ffa999c3b2eafd381d75c8a0185f2cfc9efc60be8dfc72c16
-
SSDEEP
6144:sCkgUx3zMyWYGVN27RObuLiNg8pDzKXN9tboh2pFoBmZMkTLc1P2FCLTv:Sg43zcZVNW0xwd9tbohWFoB1d/nv
Static task
static1
Behavioral task
behavioral1
Sample
255321eb39794d7a32f3e1b2a1387061a2d138b503a2cf6827cf5766d025f7f9.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
255321eb39794d7a32f3e1b2a1387061a2d138b503a2cf6827cf5766d025f7f9
-
Size
477KB
-
MD5
ddcefbf71a1a9fb9801dceb4d6722c39
-
SHA1
0f8b5785a5a445848271d5f03971b96670f74931
-
SHA256
255321eb39794d7a32f3e1b2a1387061a2d138b503a2cf6827cf5766d025f7f9
-
SHA512
2b43db79e7c350f780ed6ba2e216038cf988d9f7ace1c4a781625b770c61300390902054e0ae9d2ffa999c3b2eafd381d75c8a0185f2cfc9efc60be8dfc72c16
-
SSDEEP
6144:sCkgUx3zMyWYGVN27RObuLiNg8pDzKXN9tboh2pFoBmZMkTLc1P2FCLTv:Sg43zcZVNW0xwd9tbohWFoB1d/nv
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-