General
-
Target
aff7ccc6ab72a1467db817df1f8703e661a48ad8645e7df9a01a039535a305cc
-
Size
416KB
-
Sample
240505-vlj9vaag33
-
MD5
8f9eed1db4646f7d33c68437ef6794a1
-
SHA1
22e4331bf311e0aa7ca2f5379be70a2f185400d6
-
SHA256
aff7ccc6ab72a1467db817df1f8703e661a48ad8645e7df9a01a039535a305cc
-
SHA512
7afc2e5214bf1804954c0946b41779974a30d304ea8ed367479a3dd2c0d21dc6af001b21ec8f980c3a9e1dfb81dff1e92c0b6138320172e888a12d3a4101f8c1
-
SSDEEP
6144:aG9wXO/32gvPgCN0gydZj2u1O09omacTDTqbWLKLetZ2mrp78:BwQ3zPgCNCdZ5M092b1KDH8
Static task
static1
Behavioral task
behavioral1
Sample
aff7ccc6ab72a1467db817df1f8703e661a48ad8645e7df9a01a039535a305cc.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
aff7ccc6ab72a1467db817df1f8703e661a48ad8645e7df9a01a039535a305cc
-
Size
416KB
-
MD5
8f9eed1db4646f7d33c68437ef6794a1
-
SHA1
22e4331bf311e0aa7ca2f5379be70a2f185400d6
-
SHA256
aff7ccc6ab72a1467db817df1f8703e661a48ad8645e7df9a01a039535a305cc
-
SHA512
7afc2e5214bf1804954c0946b41779974a30d304ea8ed367479a3dd2c0d21dc6af001b21ec8f980c3a9e1dfb81dff1e92c0b6138320172e888a12d3a4101f8c1
-
SSDEEP
6144:aG9wXO/32gvPgCN0gydZj2u1O09omacTDTqbWLKLetZ2mrp78:BwQ3zPgCNCdZ5M092b1KDH8
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-