General
-
Target
85a077e4192e6627fe3c5456064ff0c9e1fa820cc65f0dfafbf521cdadc8df4d
-
Size
416KB
-
Sample
240507-ht3d6sdh7z
-
MD5
9ba89c00d13169621699738cc85a9aa7
-
SHA1
f82740951d84bf99843aa46f3eae0e7c7a8791bf
-
SHA256
85a077e4192e6627fe3c5456064ff0c9e1fa820cc65f0dfafbf521cdadc8df4d
-
SHA512
c12c5d371202898a15ef07f84589308996ae90040a9ce16968dba025ea14a2555980426e82432f1e1298888b7ad615a75d7d5192cd041a874a485fd642f8c6e6
-
SSDEEP
6144:uE9fYb7tyBIBFPOofY+dZLomCu9PVDro/rTsKIknXjrxPmHQTNWekuMiv:uEeHtJBFNYnKJro/rIKdXjF+w8Huv
Static task
static1
Behavioral task
behavioral1
Sample
85a077e4192e6627fe3c5456064ff0c9e1fa820cc65f0dfafbf521cdadc8df4d.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
85a077e4192e6627fe3c5456064ff0c9e1fa820cc65f0dfafbf521cdadc8df4d
-
Size
416KB
-
MD5
9ba89c00d13169621699738cc85a9aa7
-
SHA1
f82740951d84bf99843aa46f3eae0e7c7a8791bf
-
SHA256
85a077e4192e6627fe3c5456064ff0c9e1fa820cc65f0dfafbf521cdadc8df4d
-
SHA512
c12c5d371202898a15ef07f84589308996ae90040a9ce16968dba025ea14a2555980426e82432f1e1298888b7ad615a75d7d5192cd041a874a485fd642f8c6e6
-
SSDEEP
6144:uE9fYb7tyBIBFPOofY+dZLomCu9PVDro/rTsKIknXjrxPmHQTNWekuMiv:uEeHtJBFNYnKJro/rIKdXjF+w8Huv
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-