General
-
Target
a13656b99f475952d7f1358bfbb120bdb2200623bc2786e70a75a684ef36e936
-
Size
416KB
-
Sample
240507-frlyasaf9w
-
MD5
07d8c349a33271a41ef40c2b643d3986
-
SHA1
9596fe913610d255c0bb7d2596d4e660b06db519
-
SHA256
a13656b99f475952d7f1358bfbb120bdb2200623bc2786e70a75a684ef36e936
-
SHA512
d802a9a96c3db2fbd7bfe3bc7c228b50e01ed25d593f65fddf595ba79a33efcddbf7a08af0baec3dcda55ed886c9942a5cf3b0b8da6e63d2fafd41e7f2f7a12d
-
SSDEEP
6144:Wo9w+UAlO8GJjy6USAEk3//piLPXpuNoS4ObrpJhYQPH7kpCuMXs:WoiiL4AE+h6ZLS4ovhLuCzs
Static task
static1
Behavioral task
behavioral1
Sample
a13656b99f475952d7f1358bfbb120bdb2200623bc2786e70a75a684ef36e936.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
a13656b99f475952d7f1358bfbb120bdb2200623bc2786e70a75a684ef36e936
-
Size
416KB
-
MD5
07d8c349a33271a41ef40c2b643d3986
-
SHA1
9596fe913610d255c0bb7d2596d4e660b06db519
-
SHA256
a13656b99f475952d7f1358bfbb120bdb2200623bc2786e70a75a684ef36e936
-
SHA512
d802a9a96c3db2fbd7bfe3bc7c228b50e01ed25d593f65fddf595ba79a33efcddbf7a08af0baec3dcda55ed886c9942a5cf3b0b8da6e63d2fafd41e7f2f7a12d
-
SSDEEP
6144:Wo9w+UAlO8GJjy6USAEk3//piLPXpuNoS4ObrpJhYQPH7kpCuMXs:WoiiL4AE+h6ZLS4ovhLuCzs
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-