General
-
Target
b08473bff111ec4617ecd287d1e5eacae280d07b2f5279e54d5f99a750ae62b0
-
Size
416KB
-
Sample
240506-h56kzadc2s
-
MD5
04e226982ac08637e4a2628b3f88bc2c
-
SHA1
fd589c92d3ab600c5a69ea859387d59464f536d3
-
SHA256
b08473bff111ec4617ecd287d1e5eacae280d07b2f5279e54d5f99a750ae62b0
-
SHA512
7d1703c60594060f9edb20ce7e11db2838132fc32c9a37631e0e8d905b2c345197bdbc181c77df12420af391b86722e3115bf1fc139577b6941edc62067cb513
-
SSDEEP
12288:t3qzdg7K81Yszs4M1+KsjHhuYWa3KtwrSAPt68:MmZYR8jHhuYF168
Static task
static1
Behavioral task
behavioral1
Sample
b08473bff111ec4617ecd287d1e5eacae280d07b2f5279e54d5f99a750ae62b0.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
b08473bff111ec4617ecd287d1e5eacae280d07b2f5279e54d5f99a750ae62b0
-
Size
416KB
-
MD5
04e226982ac08637e4a2628b3f88bc2c
-
SHA1
fd589c92d3ab600c5a69ea859387d59464f536d3
-
SHA256
b08473bff111ec4617ecd287d1e5eacae280d07b2f5279e54d5f99a750ae62b0
-
SHA512
7d1703c60594060f9edb20ce7e11db2838132fc32c9a37631e0e8d905b2c345197bdbc181c77df12420af391b86722e3115bf1fc139577b6941edc62067cb513
-
SSDEEP
12288:t3qzdg7K81Yszs4M1+KsjHhuYWa3KtwrSAPt68:MmZYR8jHhuYF168
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-