General
-
Target
501c2f7253cc227dfc4737f31fe6a685f12dc21fadc076e23e44eaf8bdc31391
-
Size
416KB
-
Sample
240505-1y5zzaab68
-
MD5
802c6bc6230b334e1f09cc9abc29e693
-
SHA1
f92c01964a9010a5bdbb613abaa6b5114651d1ab
-
SHA256
501c2f7253cc227dfc4737f31fe6a685f12dc21fadc076e23e44eaf8bdc31391
-
SHA512
da8f0a153a0e2c305d6218272cb4e489bb7cc7defcac2e52fe9ca87b210abc9bfc51564535116695a3003303a441d3e55d91c3247a0fb7d3ee41f8c441135e10
-
SSDEEP
6144:xNDSLZK+bH6tSYLDidexnCihNJnrWXy1JFIHbP3ShohW90I:LSLZKK/dCCibRz4PiLaI
Static task
static1
Behavioral task
behavioral1
Sample
501c2f7253cc227dfc4737f31fe6a685f12dc21fadc076e23e44eaf8bdc31391.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
501c2f7253cc227dfc4737f31fe6a685f12dc21fadc076e23e44eaf8bdc31391
-
Size
416KB
-
MD5
802c6bc6230b334e1f09cc9abc29e693
-
SHA1
f92c01964a9010a5bdbb613abaa6b5114651d1ab
-
SHA256
501c2f7253cc227dfc4737f31fe6a685f12dc21fadc076e23e44eaf8bdc31391
-
SHA512
da8f0a153a0e2c305d6218272cb4e489bb7cc7defcac2e52fe9ca87b210abc9bfc51564535116695a3003303a441d3e55d91c3247a0fb7d3ee41f8c441135e10
-
SSDEEP
6144:xNDSLZK+bH6tSYLDidexnCihNJnrWXy1JFIHbP3ShohW90I:LSLZKK/dCCibRz4PiLaI
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-