General
-
Target
b2c70edda8a86bd94badcc7fa2b816ba7cf06dc9e0d5ec59e35d13a9c905d3b9
-
Size
416KB
-
Sample
240506-h815nadc7x
-
MD5
37ef3c7b629eb5bab13aaa25939df1aa
-
SHA1
d974ce68b5724b3f308387afac682449037a6aff
-
SHA256
b2c70edda8a86bd94badcc7fa2b816ba7cf06dc9e0d5ec59e35d13a9c905d3b9
-
SHA512
8d0b4141850079b773226dadcc2393c87a2db1a02a5ebd8e43e6f3fe627fb301d7143aa73844f746dec3b23d90d34982bbdff90248c225a26b8261a10906222e
-
SSDEEP
12288:t3qzdg7K81Yszs4M1+KsjHhuYWa3KtwrSAPt66:MmZYR8jHhuYF166
Static task
static1
Behavioral task
behavioral1
Sample
b2c70edda8a86bd94badcc7fa2b816ba7cf06dc9e0d5ec59e35d13a9c905d3b9.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
b2c70edda8a86bd94badcc7fa2b816ba7cf06dc9e0d5ec59e35d13a9c905d3b9
-
Size
416KB
-
MD5
37ef3c7b629eb5bab13aaa25939df1aa
-
SHA1
d974ce68b5724b3f308387afac682449037a6aff
-
SHA256
b2c70edda8a86bd94badcc7fa2b816ba7cf06dc9e0d5ec59e35d13a9c905d3b9
-
SHA512
8d0b4141850079b773226dadcc2393c87a2db1a02a5ebd8e43e6f3fe627fb301d7143aa73844f746dec3b23d90d34982bbdff90248c225a26b8261a10906222e
-
SSDEEP
12288:t3qzdg7K81Yszs4M1+KsjHhuYWa3KtwrSAPt66:MmZYR8jHhuYF166
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-