General
-
Target
58d2b454db2bf30b1101655231fd9e61b7b4a00c3f2b583f4422f8d541b1c91e
-
Size
423KB
-
Sample
240506-1z4tasdb91
-
MD5
e0d7b28dd6347e307c7f8a11596a6dfc
-
SHA1
a08fd1ef59115feefeba7c86e0883a7a598a945e
-
SHA256
58d2b454db2bf30b1101655231fd9e61b7b4a00c3f2b583f4422f8d541b1c91e
-
SHA512
a90f9b7b4fb9b280c59b116c2a4ae4142cc921318d661ca9cf2192e55c0421999eef3f853bc8deaafd99b4368879e656f384dd587be16a5f371412887d9b589a
-
SSDEEP
12288:U9Ez/mnZVKQ6Bci6D+GYFBBeHJYaxpYkwa:oHVKQ6d6qGYFB8lLYkwa
Static task
static1
Behavioral task
behavioral1
Sample
58d2b454db2bf30b1101655231fd9e61b7b4a00c3f2b583f4422f8d541b1c91e.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
58d2b454db2bf30b1101655231fd9e61b7b4a00c3f2b583f4422f8d541b1c91e
-
Size
423KB
-
MD5
e0d7b28dd6347e307c7f8a11596a6dfc
-
SHA1
a08fd1ef59115feefeba7c86e0883a7a598a945e
-
SHA256
58d2b454db2bf30b1101655231fd9e61b7b4a00c3f2b583f4422f8d541b1c91e
-
SHA512
a90f9b7b4fb9b280c59b116c2a4ae4142cc921318d661ca9cf2192e55c0421999eef3f853bc8deaafd99b4368879e656f384dd587be16a5f371412887d9b589a
-
SSDEEP
12288:U9Ez/mnZVKQ6Bci6D+GYFBBeHJYaxpYkwa:oHVKQ6d6qGYFB8lLYkwa
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-