General
-
Target
f01a499488f8cea475a567c2271de944982be8b32877359a0fe67429628436ff
-
Size
404KB
-
Sample
240507-3geskagg96
-
MD5
691478d9a39c2d411d59ad4259f24692
-
SHA1
53b57bfa5ebd35f798a27f8bd3d2dc366602bc5e
-
SHA256
f01a499488f8cea475a567c2271de944982be8b32877359a0fe67429628436ff
-
SHA512
8f6611e1adf3e7acf314ffd1a706cb36c5aad2cc82936b60dc474adb691be5f12934369b3b943c9139723a7e665e7067cf1a432e69335785b72b3540594c91f1
-
SSDEEP
6144:zFnmGM8FncD84WsYk8WPdFZ+V3zu4NfCWXmCL/AvBFIUHf1:z5mLrD8xgzJu3zu4Nf5XmiUOw1
Static task
static1
Behavioral task
behavioral1
Sample
f01a499488f8cea475a567c2271de944982be8b32877359a0fe67429628436ff.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
f01a499488f8cea475a567c2271de944982be8b32877359a0fe67429628436ff
-
Size
404KB
-
MD5
691478d9a39c2d411d59ad4259f24692
-
SHA1
53b57bfa5ebd35f798a27f8bd3d2dc366602bc5e
-
SHA256
f01a499488f8cea475a567c2271de944982be8b32877359a0fe67429628436ff
-
SHA512
8f6611e1adf3e7acf314ffd1a706cb36c5aad2cc82936b60dc474adb691be5f12934369b3b943c9139723a7e665e7067cf1a432e69335785b72b3540594c91f1
-
SSDEEP
6144:zFnmGM8FncD84WsYk8WPdFZ+V3zu4NfCWXmCL/AvBFIUHf1:z5mLrD8xgzJu3zu4Nf5XmiUOw1
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-