General
-
Target
7c6a88208ad32f90663de6b93e6bb5c60dd3985aac59a5151aafa56d6c69c104
-
Size
416KB
-
Sample
240506-py47wsca3z
-
MD5
90b16f9d7b0269c5cc79c29af93f9ca6
-
SHA1
e228dac9c7385395b3b4ab273ac3a86e3cd4b3a7
-
SHA256
7c6a88208ad32f90663de6b93e6bb5c60dd3985aac59a5151aafa56d6c69c104
-
SHA512
2d69d246cc670778a3e8ac9b0fb617e4cd328c8693e470b326cc34338d8e34d14c02e12d17ce8693c47cb76fc295d88130df4762e47b487ed00c99ca5859898d
-
SSDEEP
6144:H/BZItaWG0e12qQ61HC7bIxM6Wp8ik/QAYiVA2XOxx0HNhBp7/nyaFotaZv:fBZI4WObXGIa6AA/eV+HNhLvCtcv
Static task
static1
Behavioral task
behavioral1
Sample
7c6a88208ad32f90663de6b93e6bb5c60dd3985aac59a5151aafa56d6c69c104.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
7c6a88208ad32f90663de6b93e6bb5c60dd3985aac59a5151aafa56d6c69c104
-
Size
416KB
-
MD5
90b16f9d7b0269c5cc79c29af93f9ca6
-
SHA1
e228dac9c7385395b3b4ab273ac3a86e3cd4b3a7
-
SHA256
7c6a88208ad32f90663de6b93e6bb5c60dd3985aac59a5151aafa56d6c69c104
-
SHA512
2d69d246cc670778a3e8ac9b0fb617e4cd328c8693e470b326cc34338d8e34d14c02e12d17ce8693c47cb76fc295d88130df4762e47b487ed00c99ca5859898d
-
SSDEEP
6144:H/BZItaWG0e12qQ61HC7bIxM6Wp8ik/QAYiVA2XOxx0HNhBp7/nyaFotaZv:fBZI4WObXGIa6AA/eV+HNhLvCtcv
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-