General
-
Target
ddea935c57dea3f914a2081e7ef38d7f089c937724857c4175298c42485ed751
-
Size
450KB
-
Sample
240506-3wnn1sha5s
-
MD5
e12bbef933d048bdd6fc12428211ac18
-
SHA1
98fb417f4956155ce56843d7db0ea4aeb59b8c0e
-
SHA256
ddea935c57dea3f914a2081e7ef38d7f089c937724857c4175298c42485ed751
-
SHA512
822a192df6eb608f1152d28392e7edec9a5ad733e36fd3266fb8e88215cdf171374d7025d264215c6d706a17ade769f85b0fb9596dd7b750a99ed2add762ec9f
-
SSDEEP
12288:LG2lUG0NVvKXW/WqwO0YSTPZSeSnnKPkDa:LgVvoU9fsPUeSKPkDa
Static task
static1
Behavioral task
behavioral1
Sample
ddea935c57dea3f914a2081e7ef38d7f089c937724857c4175298c42485ed751.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
ddea935c57dea3f914a2081e7ef38d7f089c937724857c4175298c42485ed751
-
Size
450KB
-
MD5
e12bbef933d048bdd6fc12428211ac18
-
SHA1
98fb417f4956155ce56843d7db0ea4aeb59b8c0e
-
SHA256
ddea935c57dea3f914a2081e7ef38d7f089c937724857c4175298c42485ed751
-
SHA512
822a192df6eb608f1152d28392e7edec9a5ad733e36fd3266fb8e88215cdf171374d7025d264215c6d706a17ade769f85b0fb9596dd7b750a99ed2add762ec9f
-
SSDEEP
12288:LG2lUG0NVvKXW/WqwO0YSTPZSeSnnKPkDa:LgVvoU9fsPUeSKPkDa
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-