General
-
Target
73c00894b1b24243284cc6edff267ec3e478779e5874a749db702f8cd5e62deb
-
Size
416KB
-
Sample
240506-prkjxabg3v
-
MD5
5f31a22e1c7db33143a9ede9d1d0cf86
-
SHA1
fc6f43c2894edd0686d4b5c5ac3efab150f84975
-
SHA256
73c00894b1b24243284cc6edff267ec3e478779e5874a749db702f8cd5e62deb
-
SHA512
20c380a8f09d1ac8978d217fdf67af2482de1d9158038c65f4766b76b35f2039d3ee431f22e0fb971869ad5d7f6bd619341c07f64ca7e2a4afbcefdac3424929
-
SSDEEP
6144:f/sljtGLGm0LFOvzmqUW8TcCovExfTp87gctz9Cc1jUyBnxeLDYtaZs:f/sljMLnmgSSecCmgpyz9C2/nO0tcs
Static task
static1
Behavioral task
behavioral1
Sample
73c00894b1b24243284cc6edff267ec3e478779e5874a749db702f8cd5e62deb.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
73c00894b1b24243284cc6edff267ec3e478779e5874a749db702f8cd5e62deb
-
Size
416KB
-
MD5
5f31a22e1c7db33143a9ede9d1d0cf86
-
SHA1
fc6f43c2894edd0686d4b5c5ac3efab150f84975
-
SHA256
73c00894b1b24243284cc6edff267ec3e478779e5874a749db702f8cd5e62deb
-
SHA512
20c380a8f09d1ac8978d217fdf67af2482de1d9158038c65f4766b76b35f2039d3ee431f22e0fb971869ad5d7f6bd619341c07f64ca7e2a4afbcefdac3424929
-
SSDEEP
6144:f/sljtGLGm0LFOvzmqUW8TcCovExfTp87gctz9Cc1jUyBnxeLDYtaZs:f/sljMLnmgSSecCmgpyz9C2/nO0tcs
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-