General
-
Target
ff3351d302b3dee394fa17d8e7da32ea4933280cf9e3231c8279e00f19379c66
-
Size
417KB
-
Sample
240505-1mqqxahg78
-
MD5
d3df6d7b737c64e25cd05600c78a13fc
-
SHA1
9704ba0b5b12932ebca3ef1c2be79ddc359ffb9a
-
SHA256
ff3351d302b3dee394fa17d8e7da32ea4933280cf9e3231c8279e00f19379c66
-
SHA512
5ac887e8fe43bc5e90863fa3c83c0531f8a6a646d98858f2cf29491d63cc3271cc92918f25cda3bf7e0080d1f66901f761ee5dacbac22af2f63580265c35064b
-
SSDEEP
6144:GlYyAMIn4ySxIRsKZ5deRy4Y/mzUemFz1ACcWuah07P/dhW90P:GlYyApn4hxIRX5deOmzUFBAC5eP/SaP
Static task
static1
Behavioral task
behavioral1
Sample
ff3351d302b3dee394fa17d8e7da32ea4933280cf9e3231c8279e00f19379c66.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
ff3351d302b3dee394fa17d8e7da32ea4933280cf9e3231c8279e00f19379c66
-
Size
417KB
-
MD5
d3df6d7b737c64e25cd05600c78a13fc
-
SHA1
9704ba0b5b12932ebca3ef1c2be79ddc359ffb9a
-
SHA256
ff3351d302b3dee394fa17d8e7da32ea4933280cf9e3231c8279e00f19379c66
-
SHA512
5ac887e8fe43bc5e90863fa3c83c0531f8a6a646d98858f2cf29491d63cc3271cc92918f25cda3bf7e0080d1f66901f761ee5dacbac22af2f63580265c35064b
-
SSDEEP
6144:GlYyAMIn4ySxIRsKZ5deRy4Y/mzUemFz1ACcWuah07P/dhW90P:GlYyApn4hxIRX5deOmzUFBAC5eP/SaP
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-