General
-
Target
d85dc7577c5fa14860a3eed57480b65a066c8eb723cbfc07974d897a92f7b26e
-
Size
416KB
-
Sample
240506-syaj3age4s
-
MD5
bbef2a9c47aa5b820bda66cebc8a8444
-
SHA1
cffba9f2ff82c1d3ac16fd53279ad004841f89d2
-
SHA256
d85dc7577c5fa14860a3eed57480b65a066c8eb723cbfc07974d897a92f7b26e
-
SHA512
530a29c97202a9b29fc6c84f685ea4fb0613e1bbddb97ef0a516b21a4a8972ccd183e44b64aa26b110415cf0a93c0615031366c6953c4cf439d40c02d652d464
-
SSDEEP
12288:V/36Qn32mOgeVztEMz3Jx8fnLd4S3Ntco:t7deXP8fnRTco
Static task
static1
Behavioral task
behavioral1
Sample
d85dc7577c5fa14860a3eed57480b65a066c8eb723cbfc07974d897a92f7b26e.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
d85dc7577c5fa14860a3eed57480b65a066c8eb723cbfc07974d897a92f7b26e
-
Size
416KB
-
MD5
bbef2a9c47aa5b820bda66cebc8a8444
-
SHA1
cffba9f2ff82c1d3ac16fd53279ad004841f89d2
-
SHA256
d85dc7577c5fa14860a3eed57480b65a066c8eb723cbfc07974d897a92f7b26e
-
SHA512
530a29c97202a9b29fc6c84f685ea4fb0613e1bbddb97ef0a516b21a4a8972ccd183e44b64aa26b110415cf0a93c0615031366c6953c4cf439d40c02d652d464
-
SSDEEP
12288:V/36Qn32mOgeVztEMz3Jx8fnLd4S3Ntco:t7deXP8fnRTco
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-