General
-
Target
90a5cadd85dd2621a9c41d8c653bb8d8f553365429468b122f43f0e063d3ae00
-
Size
417KB
-
Sample
240506-lqwc8sbb62
-
MD5
be8520de152043f447311594f4ae117d
-
SHA1
faf0c097ce113bcaa3171233020f5137371c88a5
-
SHA256
90a5cadd85dd2621a9c41d8c653bb8d8f553365429468b122f43f0e063d3ae00
-
SHA512
d3f589dae9f18eb16c42247b12a4e16e9644ff98ac0001f8ac84375f8d11dc321884ef29724d59690716cd7b8b017c93f29ff570f8e7bc8639836e18e8c04e9d
-
SSDEEP
6144:Gvm5q7cumHxCrGqFot529roAosBXIwDT6Wg1dHN8pQUfFZpYY8pS/rUUwKOgYtav:Gvqq7cumorCFKpnq/OFr8pvKStK/
Static task
static1
Behavioral task
behavioral1
Sample
90a5cadd85dd2621a9c41d8c653bb8d8f553365429468b122f43f0e063d3ae00.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
90a5cadd85dd2621a9c41d8c653bb8d8f553365429468b122f43f0e063d3ae00
-
Size
417KB
-
MD5
be8520de152043f447311594f4ae117d
-
SHA1
faf0c097ce113bcaa3171233020f5137371c88a5
-
SHA256
90a5cadd85dd2621a9c41d8c653bb8d8f553365429468b122f43f0e063d3ae00
-
SHA512
d3f589dae9f18eb16c42247b12a4e16e9644ff98ac0001f8ac84375f8d11dc321884ef29724d59690716cd7b8b017c93f29ff570f8e7bc8639836e18e8c04e9d
-
SSDEEP
6144:Gvm5q7cumHxCrGqFot529roAosBXIwDT6Wg1dHN8pQUfFZpYY8pS/rUUwKOgYtav:Gvqq7cumorCFKpnq/OFr8pvKStK/
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-