General
-
Target
2e52c92dd83065abfb30b42c294d1e49fb960749c573aa99d7c18d9d3f33c371
-
Size
423KB
-
Sample
240506-1xpllaga56
-
MD5
92089b067cad0bdecfdc37192a1ca262
-
SHA1
f4d43353fd502c1a0867447e0a5c8f822119d433
-
SHA256
2e52c92dd83065abfb30b42c294d1e49fb960749c573aa99d7c18d9d3f33c371
-
SHA512
b48989bb86cdcb3367cad8dd42af02c4b5fe557f4442b903a4550ae840625ca8e9a20d4136fde6de466341552c634c2d2ce8ef81e828aec864001829a616de4b
-
SSDEEP
12288:U9Ez/mnZVKQ6Bci6D+GYFBBeHJYaxpYkwV:oHVKQ6d6qGYFB8lLYkwV
Static task
static1
Behavioral task
behavioral1
Sample
2e52c92dd83065abfb30b42c294d1e49fb960749c573aa99d7c18d9d3f33c371.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
2e52c92dd83065abfb30b42c294d1e49fb960749c573aa99d7c18d9d3f33c371
-
Size
423KB
-
MD5
92089b067cad0bdecfdc37192a1ca262
-
SHA1
f4d43353fd502c1a0867447e0a5c8f822119d433
-
SHA256
2e52c92dd83065abfb30b42c294d1e49fb960749c573aa99d7c18d9d3f33c371
-
SHA512
b48989bb86cdcb3367cad8dd42af02c4b5fe557f4442b903a4550ae840625ca8e9a20d4136fde6de466341552c634c2d2ce8ef81e828aec864001829a616de4b
-
SSDEEP
12288:U9Ez/mnZVKQ6Bci6D+GYFBBeHJYaxpYkwV:oHVKQ6d6qGYFB8lLYkwV
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-