General
-
Target
4b67132f548e1e818c48de7a60b10f25.exe
-
Size
440KB
-
Sample
240416-lgf7ysgc2v
-
MD5
4b67132f548e1e818c48de7a60b10f25
-
SHA1
5152029f73a2475e4929cffab895647112714625
-
SHA256
a7a142597d3460b97069a66ff9b0715f1886f15e33d9a0606e9a74acaa6b0bb4
-
SHA512
e5c73791075f91d2bfe7a7a393788b89d21e0bde29deee7542f795c0cb9975365430af9a3ed44ce454d4366c9c41327b1efa7032a9784c3d2dc176a27a1389f2
-
SSDEEP
6144:F7tHLVrEHo/Qi62tEHJym1hp2o8krwYHUXiK1YJrcbxuTvK:F7tHpAdispyGhQiMiAvxKvK
Static task
static1
Behavioral task
behavioral1
Sample
4b67132f548e1e818c48de7a60b10f25.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
4b67132f548e1e818c48de7a60b10f25.exe
-
Size
440KB
-
MD5
4b67132f548e1e818c48de7a60b10f25
-
SHA1
5152029f73a2475e4929cffab895647112714625
-
SHA256
a7a142597d3460b97069a66ff9b0715f1886f15e33d9a0606e9a74acaa6b0bb4
-
SHA512
e5c73791075f91d2bfe7a7a393788b89d21e0bde29deee7542f795c0cb9975365430af9a3ed44ce454d4366c9c41327b1efa7032a9784c3d2dc176a27a1389f2
-
SSDEEP
6144:F7tHLVrEHo/Qi62tEHJym1hp2o8krwYHUXiK1YJrcbxuTvK:F7tHpAdispyGhQiMiAvxKvK
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-