General
-
Target
73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771
-
Size
372KB
-
Sample
240507-bzdjnsfd85
-
MD5
9f712ea5a04bfae2238764f668305642
-
SHA1
864debdeec4d00430661070fc1dab479cfc8a6ef
-
SHA256
73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771
-
SHA512
25ff360b96fd99abf9e0a6afbd489e3efdf76685b246384cd61ab692a828a1ee7cc508afd95273c10b45c5b7d358bee142a860b134f75375358045bf3b1363d3
-
SSDEEP
6144:pl+08UGGfdzF7qxvwcB793ituNKkzXwGZTapV:p808UGgdtqrhauN3XwwapV
Static task
static1
Behavioral task
behavioral1
Sample
73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771
-
Size
372KB
-
MD5
9f712ea5a04bfae2238764f668305642
-
SHA1
864debdeec4d00430661070fc1dab479cfc8a6ef
-
SHA256
73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771
-
SHA512
25ff360b96fd99abf9e0a6afbd489e3efdf76685b246384cd61ab692a828a1ee7cc508afd95273c10b45c5b7d358bee142a860b134f75375358045bf3b1363d3
-
SSDEEP
6144:pl+08UGGfdzF7qxvwcB793ituNKkzXwGZTapV:p808UGgdtqrhauN3XwwapV
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-