General
-
Target
fa083d33e1961e2f0435d0569fb66035992a7367080ed45bd0f25bcef4e1a538
-
Size
416KB
-
Sample
240505-vjge6sfd8w
-
MD5
f3d07121cb6a70f580936b41f89d5964
-
SHA1
311503eb3626adc9944090c1995cb63519ac2d95
-
SHA256
fa083d33e1961e2f0435d0569fb66035992a7367080ed45bd0f25bcef4e1a538
-
SHA512
03840ba037addd0c96d5d9c3e2d21ec7e3e46d8405401d5aff5b0a467cd49ce6f4f1408d0afd6fed4f5397d56864bddb9c6d69e61b72f779c88cef38690f5cdc
-
SSDEEP
6144:aG9wXO/32gvPgCN0gydZj2u1O09omacTDTqbWLKLetZ2mrp74:BwQ3zPgCNCdZ5M092b1KDH4
Static task
static1
Behavioral task
behavioral1
Sample
fa083d33e1961e2f0435d0569fb66035992a7367080ed45bd0f25bcef4e1a538.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
fa083d33e1961e2f0435d0569fb66035992a7367080ed45bd0f25bcef4e1a538
-
Size
416KB
-
MD5
f3d07121cb6a70f580936b41f89d5964
-
SHA1
311503eb3626adc9944090c1995cb63519ac2d95
-
SHA256
fa083d33e1961e2f0435d0569fb66035992a7367080ed45bd0f25bcef4e1a538
-
SHA512
03840ba037addd0c96d5d9c3e2d21ec7e3e46d8405401d5aff5b0a467cd49ce6f4f1408d0afd6fed4f5397d56864bddb9c6d69e61b72f779c88cef38690f5cdc
-
SSDEEP
6144:aG9wXO/32gvPgCN0gydZj2u1O09omacTDTqbWLKLetZ2mrp74:BwQ3zPgCNCdZ5M092b1KDH4
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-