General
-
Target
8bec63e44ee940f155083bb00a304b8162304bf6a2de8d415882cfc5cee1fd9e
-
Size
423KB
-
Sample
240506-2cbdxagh97
-
MD5
0bcccc1ffd9544e8f0defdb6a1026b3b
-
SHA1
0ec2cc15799121aec72ef0856051dc26e3e81d2d
-
SHA256
8bec63e44ee940f155083bb00a304b8162304bf6a2de8d415882cfc5cee1fd9e
-
SHA512
f3016f8802af96c3cc13edceebe922bc19169d73c361cda93d1bececb09b0f3c0d440452f27a96539a246bea370d53572cf30e1536efac8b06c3ae9ce7b32c01
-
SSDEEP
12288:U9Ez/mnZVKQ6Bci6D+GYFBBeHJYaxpYkwf:oHVKQ6d6qGYFB8lLYkwf
Static task
static1
Behavioral task
behavioral1
Sample
8bec63e44ee940f155083bb00a304b8162304bf6a2de8d415882cfc5cee1fd9e.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
8bec63e44ee940f155083bb00a304b8162304bf6a2de8d415882cfc5cee1fd9e
-
Size
423KB
-
MD5
0bcccc1ffd9544e8f0defdb6a1026b3b
-
SHA1
0ec2cc15799121aec72ef0856051dc26e3e81d2d
-
SHA256
8bec63e44ee940f155083bb00a304b8162304bf6a2de8d415882cfc5cee1fd9e
-
SHA512
f3016f8802af96c3cc13edceebe922bc19169d73c361cda93d1bececb09b0f3c0d440452f27a96539a246bea370d53572cf30e1536efac8b06c3ae9ce7b32c01
-
SSDEEP
12288:U9Ez/mnZVKQ6Bci6D+GYFBBeHJYaxpYkwf:oHVKQ6d6qGYFB8lLYkwf
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-