General
-
Target
7b2033cc8b4e87252204a2f83d45e428dfc0c087200a8cdff5ed44a0ca05d2d7
-
Size
416KB
-
Sample
240506-jkr3hsgf42
-
MD5
24a68b84516bb61fefab64c2c4268799
-
SHA1
78759c383f529aac9c5b12882b8df418aa13d6c1
-
SHA256
7b2033cc8b4e87252204a2f83d45e428dfc0c087200a8cdff5ed44a0ca05d2d7
-
SHA512
11550ca35287c2c7095fc716cafbdf5733826db3b5e5d28e796f9e66d4ec1a0673c1a53af91c9024cbb349e7389cbb3c476f8a9d77c032fa51fdf44745909ddc
-
SSDEEP
12288:t3qzdg7K81Yszs4M1+KsjHhuYWa3KtwrSAPt64:MmZYR8jHhuYF164
Static task
static1
Behavioral task
behavioral1
Sample
7b2033cc8b4e87252204a2f83d45e428dfc0c087200a8cdff5ed44a0ca05d2d7.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
7b2033cc8b4e87252204a2f83d45e428dfc0c087200a8cdff5ed44a0ca05d2d7
-
Size
416KB
-
MD5
24a68b84516bb61fefab64c2c4268799
-
SHA1
78759c383f529aac9c5b12882b8df418aa13d6c1
-
SHA256
7b2033cc8b4e87252204a2f83d45e428dfc0c087200a8cdff5ed44a0ca05d2d7
-
SHA512
11550ca35287c2c7095fc716cafbdf5733826db3b5e5d28e796f9e66d4ec1a0673c1a53af91c9024cbb349e7389cbb3c476f8a9d77c032fa51fdf44745909ddc
-
SSDEEP
12288:t3qzdg7K81Yszs4M1+KsjHhuYWa3KtwrSAPt64:MmZYR8jHhuYF164
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-