General
-
Target
a17d9bf89857acbd61878f1fc0d1b5c0b8eb1bec01cb6495246156433f2b3271
-
Size
416KB
-
Sample
240507-htvpbsdh7s
-
MD5
f62011816645ce3d94b92743b3704f29
-
SHA1
3e9510d78a15095d02d35a3790ad3bd4ac2c869e
-
SHA256
a17d9bf89857acbd61878f1fc0d1b5c0b8eb1bec01cb6495246156433f2b3271
-
SHA512
1e915db820016db8d1b6bb69d0fa96c686fcba258c7b918fa1101fdce676ef616f9be031c5e6b38b8dd2e3573f5eec15a34485264e452833c4154841a6790a3d
-
SSDEEP
6144:uE9fYb7tyBIBFPOofY+dZLomCu9PVDro/rTsKIknXjrxPmHQTNWekuMis:uEeHtJBFNYnKJro/rIKdXjF+w8Hus
Static task
static1
Behavioral task
behavioral1
Sample
a17d9bf89857acbd61878f1fc0d1b5c0b8eb1bec01cb6495246156433f2b3271.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
a17d9bf89857acbd61878f1fc0d1b5c0b8eb1bec01cb6495246156433f2b3271
-
Size
416KB
-
MD5
f62011816645ce3d94b92743b3704f29
-
SHA1
3e9510d78a15095d02d35a3790ad3bd4ac2c869e
-
SHA256
a17d9bf89857acbd61878f1fc0d1b5c0b8eb1bec01cb6495246156433f2b3271
-
SHA512
1e915db820016db8d1b6bb69d0fa96c686fcba258c7b918fa1101fdce676ef616f9be031c5e6b38b8dd2e3573f5eec15a34485264e452833c4154841a6790a3d
-
SSDEEP
6144:uE9fYb7tyBIBFPOofY+dZLomCu9PVDro/rTsKIknXjrxPmHQTNWekuMis:uEeHtJBFNYnKJro/rIKdXjF+w8Hus
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-