General
-
Target
a476af025f2691783739a6a993d8eb341064e9aca4b8ef0e1d3fd83e3c540ec4
-
Size
404KB
-
Sample
240507-3ac1dsdf4v
-
MD5
1f58908893435b931de9645a00f025f1
-
SHA1
84c646f48e749058838cf135dae18bc5b95c1e7c
-
SHA256
a476af025f2691783739a6a993d8eb341064e9aca4b8ef0e1d3fd83e3c540ec4
-
SHA512
428249714fc307f713ea98c7414d4f02c93b4645b08c7eeab268b26ec008ada1502d169b185e2ffa451cfc09ba53578ae78c27b055fd7f2b3968edb82923d844
-
SSDEEP
6144:zFnmGM8FncD84WsYk8WPdFZ+V3zu4NfCWXmCL/AvBFIUHf6:z5mLrD8xgzJu3zu4Nf5XmiUOw6
Static task
static1
Behavioral task
behavioral1
Sample
a476af025f2691783739a6a993d8eb341064e9aca4b8ef0e1d3fd83e3c540ec4.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
a476af025f2691783739a6a993d8eb341064e9aca4b8ef0e1d3fd83e3c540ec4
-
Size
404KB
-
MD5
1f58908893435b931de9645a00f025f1
-
SHA1
84c646f48e749058838cf135dae18bc5b95c1e7c
-
SHA256
a476af025f2691783739a6a993d8eb341064e9aca4b8ef0e1d3fd83e3c540ec4
-
SHA512
428249714fc307f713ea98c7414d4f02c93b4645b08c7eeab268b26ec008ada1502d169b185e2ffa451cfc09ba53578ae78c27b055fd7f2b3968edb82923d844
-
SSDEEP
6144:zFnmGM8FncD84WsYk8WPdFZ+V3zu4NfCWXmCL/AvBFIUHf6:z5mLrD8xgzJu3zu4Nf5XmiUOw6
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-