General
-
Target
ffa8737a3cc195bc20ae01b600b881f35c4345543525fa6c4e4f62f9f8860409
-
Size
416KB
-
Sample
240507-fqsdpaaf6y
-
MD5
2d383be01f5c3dcae1a64b460df7306d
-
SHA1
25656f729aa5efd10f2886810b5d14e701ca785e
-
SHA256
ffa8737a3cc195bc20ae01b600b881f35c4345543525fa6c4e4f62f9f8860409
-
SHA512
5657fec8760f788632549a9e909108fd25b0395f8e51c084fda80e300a9256409dea8bf416f75a57f10ac4299c1ccef570f909629c2b10eb74b7681b9250a545
-
SSDEEP
6144:Wo9w+UAlO8GJjy6USAEk3//piLPXpuNoS4ObrpJhYQPH7kpCuMXo:WoiiL4AE+h6ZLS4ovhLuCzo
Static task
static1
Behavioral task
behavioral1
Sample
ffa8737a3cc195bc20ae01b600b881f35c4345543525fa6c4e4f62f9f8860409.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
ffa8737a3cc195bc20ae01b600b881f35c4345543525fa6c4e4f62f9f8860409
-
Size
416KB
-
MD5
2d383be01f5c3dcae1a64b460df7306d
-
SHA1
25656f729aa5efd10f2886810b5d14e701ca785e
-
SHA256
ffa8737a3cc195bc20ae01b600b881f35c4345543525fa6c4e4f62f9f8860409
-
SHA512
5657fec8760f788632549a9e909108fd25b0395f8e51c084fda80e300a9256409dea8bf416f75a57f10ac4299c1ccef570f909629c2b10eb74b7681b9250a545
-
SSDEEP
6144:Wo9w+UAlO8GJjy6USAEk3//piLPXpuNoS4ObrpJhYQPH7kpCuMXo:WoiiL4AE+h6ZLS4ovhLuCzo
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-