General
-
Target
2d2aba55cce65e5055066822e68d6a7f8c713893e26be1020e39da6240f7fa0e
-
Size
416KB
-
Sample
240506-h4r17aga47
-
MD5
61588603cb8f17da63a4dacbf18c07a5
-
SHA1
81ac84b532629b0929d311dd0b4b97bcb6cb4cdc
-
SHA256
2d2aba55cce65e5055066822e68d6a7f8c713893e26be1020e39da6240f7fa0e
-
SHA512
1ba3e7c6cf23022bc60e338c3f56bdba57d1ed371b140758ecbd5d6c73e520fecee17b7ee28618a40abb48965b5e04745729045200f9b7213ce0bfd20fb4dfc5
-
SSDEEP
12288:t3qzdg7K81Yszs4M1+KsjHhuYWa3KtwrSAPt6/:MmZYR8jHhuYF16/
Static task
static1
Behavioral task
behavioral1
Sample
2d2aba55cce65e5055066822e68d6a7f8c713893e26be1020e39da6240f7fa0e.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
2d2aba55cce65e5055066822e68d6a7f8c713893e26be1020e39da6240f7fa0e
-
Size
416KB
-
MD5
61588603cb8f17da63a4dacbf18c07a5
-
SHA1
81ac84b532629b0929d311dd0b4b97bcb6cb4cdc
-
SHA256
2d2aba55cce65e5055066822e68d6a7f8c713893e26be1020e39da6240f7fa0e
-
SHA512
1ba3e7c6cf23022bc60e338c3f56bdba57d1ed371b140758ecbd5d6c73e520fecee17b7ee28618a40abb48965b5e04745729045200f9b7213ce0bfd20fb4dfc5
-
SSDEEP
12288:t3qzdg7K81Yszs4M1+KsjHhuYWa3KtwrSAPt6/:MmZYR8jHhuYF16/
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-