General
-
Target
26ce1d1cfc3ffc63b496b1c5583f70de25279431046cb3ddf049fc154ebf46cb
-
Size
416KB
-
Sample
240506-ppq9nsbf7t
-
MD5
1d437f67261c695500c037d84c4b1616
-
SHA1
7d806114ff347dc632514d93a86a583d6a388ffc
-
SHA256
26ce1d1cfc3ffc63b496b1c5583f70de25279431046cb3ddf049fc154ebf46cb
-
SHA512
903bd7361b1c98676a2d0566a3582a2fc0ab014ec2afb87e777716e5037fa0558fc2114f7a69eaa9db86e46c58c3d863903546dc68e6e6c2efc6ff5f06ab0827
-
SSDEEP
6144:f/sljtGLGm0LFOvzmqUW8TcCovExfTp87gctz9Cc1jUyBnxeLDYtaZv:f/sljMLnmgSSecCmgpyz9C2/nO0tcv
Static task
static1
Behavioral task
behavioral1
Sample
26ce1d1cfc3ffc63b496b1c5583f70de25279431046cb3ddf049fc154ebf46cb.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
26ce1d1cfc3ffc63b496b1c5583f70de25279431046cb3ddf049fc154ebf46cb
-
Size
416KB
-
MD5
1d437f67261c695500c037d84c4b1616
-
SHA1
7d806114ff347dc632514d93a86a583d6a388ffc
-
SHA256
26ce1d1cfc3ffc63b496b1c5583f70de25279431046cb3ddf049fc154ebf46cb
-
SHA512
903bd7361b1c98676a2d0566a3582a2fc0ab014ec2afb87e777716e5037fa0558fc2114f7a69eaa9db86e46c58c3d863903546dc68e6e6c2efc6ff5f06ab0827
-
SSDEEP
6144:f/sljtGLGm0LFOvzmqUW8TcCovExfTp87gctz9Cc1jUyBnxeLDYtaZv:f/sljMLnmgSSecCmgpyz9C2/nO0tcv
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-