General
-
Target
133e9bf092c5b34f9c90978e73dcbdbf58e60209216a091a95de91ffd01dd9da
-
Size
416KB
-
Sample
240505-1w8m3sfb4w
-
MD5
39771042beb6fa40a487ff10e4e50d86
-
SHA1
69f1647638f23d4132d499f71b3d251e32ad9ccb
-
SHA256
133e9bf092c5b34f9c90978e73dcbdbf58e60209216a091a95de91ffd01dd9da
-
SHA512
e017b741cc5f2abfd91f6c92e55fb5918f0a3663bcb37b961e65e6690741b4cc3005e0b6cfc525012e02ea5589d102d728d8df4a687c6131ad0a79bb9b5fdfd4
-
SSDEEP
6144:xNDSLZK+bH6tSYLDidexnCihNJnrWXy1JFIHbP3ShohW90P:LSLZKK/dCCibRz4PiLaP
Static task
static1
Behavioral task
behavioral1
Sample
133e9bf092c5b34f9c90978e73dcbdbf58e60209216a091a95de91ffd01dd9da.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
133e9bf092c5b34f9c90978e73dcbdbf58e60209216a091a95de91ffd01dd9da
-
Size
416KB
-
MD5
39771042beb6fa40a487ff10e4e50d86
-
SHA1
69f1647638f23d4132d499f71b3d251e32ad9ccb
-
SHA256
133e9bf092c5b34f9c90978e73dcbdbf58e60209216a091a95de91ffd01dd9da
-
SHA512
e017b741cc5f2abfd91f6c92e55fb5918f0a3663bcb37b961e65e6690741b4cc3005e0b6cfc525012e02ea5589d102d728d8df4a687c6131ad0a79bb9b5fdfd4
-
SSDEEP
6144:xNDSLZK+bH6tSYLDidexnCihNJnrWXy1JFIHbP3ShohW90P:LSLZKK/dCCibRz4PiLaP
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-