General
-
Target
f901ec0e346db59fd39c83d204281ecd342787be99a2c70b3a172d49f99caada
-
Size
398KB
-
Sample
240505-sdp41sdc9v
-
MD5
5a875c4870660d52cc0f5854504f4e58
-
SHA1
d29234545041ed5a5aa379436e7acdf434cf8c4d
-
SHA256
f901ec0e346db59fd39c83d204281ecd342787be99a2c70b3a172d49f99caada
-
SHA512
a27105750c399dab4f00ff01724494549b7d668ce2834daf6dad1c03823994f720bde4f32f66065a0db32c3468b5d83e1d9cd941c8df42582027311068b8addc
-
SSDEEP
6144:PGC4KxC35rFAajEOyfpC0UWvLVtoyQzEofYbWpYmEGtgUkKLl:T4KkJf/yfpCfWvLNQnzp5EsgzAl
Static task
static1
Behavioral task
behavioral1
Sample
f901ec0e346db59fd39c83d204281ecd342787be99a2c70b3a172d49f99caada.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
f901ec0e346db59fd39c83d204281ecd342787be99a2c70b3a172d49f99caada
-
Size
398KB
-
MD5
5a875c4870660d52cc0f5854504f4e58
-
SHA1
d29234545041ed5a5aa379436e7acdf434cf8c4d
-
SHA256
f901ec0e346db59fd39c83d204281ecd342787be99a2c70b3a172d49f99caada
-
SHA512
a27105750c399dab4f00ff01724494549b7d668ce2834daf6dad1c03823994f720bde4f32f66065a0db32c3468b5d83e1d9cd941c8df42582027311068b8addc
-
SSDEEP
6144:PGC4KxC35rFAajEOyfpC0UWvLVtoyQzEofYbWpYmEGtgUkKLl:T4KkJf/yfpCfWvLNQnzp5EsgzAl
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-