General
-
Target
62d3a2493a66b19bc7a35b6d913406f60f2f8ccab6226a661aa892863fd53526
-
Size
417KB
-
Sample
240506-mmfztacc93
-
MD5
1c01810e6da17f5fc6865a1996eb5582
-
SHA1
3afaebbb03c7424eb380282e7f290ec3e5e4d4fe
-
SHA256
62d3a2493a66b19bc7a35b6d913406f60f2f8ccab6226a661aa892863fd53526
-
SHA512
a5a17b77526474e547637cd12b279de3575d8560f46eab6b817790e57f993b6baabfdd431c9ca4a9aaec7a39459a480ba84247d50b14a871d43c852e3c70bfa5
-
SSDEEP
6144:d5pk6VtVbGU1sVOzp0f1eYVwIuI84glzNwiaTSLrqi3Vta5F:d5pjVLbX0ONzYarI0lzhaT+RVtMF
Static task
static1
Behavioral task
behavioral1
Sample
62d3a2493a66b19bc7a35b6d913406f60f2f8ccab6226a661aa892863fd53526.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
62d3a2493a66b19bc7a35b6d913406f60f2f8ccab6226a661aa892863fd53526
-
Size
417KB
-
MD5
1c01810e6da17f5fc6865a1996eb5582
-
SHA1
3afaebbb03c7424eb380282e7f290ec3e5e4d4fe
-
SHA256
62d3a2493a66b19bc7a35b6d913406f60f2f8ccab6226a661aa892863fd53526
-
SHA512
a5a17b77526474e547637cd12b279de3575d8560f46eab6b817790e57f993b6baabfdd431c9ca4a9aaec7a39459a480ba84247d50b14a871d43c852e3c70bfa5
-
SSDEEP
6144:d5pk6VtVbGU1sVOzp0f1eYVwIuI84glzNwiaTSLrqi3Vta5F:d5pjVLbX0ONzYarI0lzhaT+RVtMF
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-