General
-
Target
663d4ada077bad577517aa6a3f8e325abbb238cce7a72b838aecd3b15df65ca6
-
Size
416KB
-
Sample
240507-hvm1wagh48
-
MD5
e6ae3376046f35a92fde5f0e40ad079b
-
SHA1
d94b07bc322b6175a1d72ccf240d9d4af545a9ad
-
SHA256
663d4ada077bad577517aa6a3f8e325abbb238cce7a72b838aecd3b15df65ca6
-
SHA512
8625fa8dc661c990b90f2fad3841b65ec23aaacc34d4bbe318a92f3c1bdb983ca70c416b4e13f6335b3a4609b4090fe0b4f45fa40a15277f790c88fe6a11476e
-
SSDEEP
6144:uE9fYb7tyBIBFPOofY+dZLomCu9PVDro/rTsKIknXjrxPmHQTNWekuMio:uEeHtJBFNYnKJro/rIKdXjF+w8Huo
Static task
static1
Behavioral task
behavioral1
Sample
663d4ada077bad577517aa6a3f8e325abbb238cce7a72b838aecd3b15df65ca6.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
663d4ada077bad577517aa6a3f8e325abbb238cce7a72b838aecd3b15df65ca6
-
Size
416KB
-
MD5
e6ae3376046f35a92fde5f0e40ad079b
-
SHA1
d94b07bc322b6175a1d72ccf240d9d4af545a9ad
-
SHA256
663d4ada077bad577517aa6a3f8e325abbb238cce7a72b838aecd3b15df65ca6
-
SHA512
8625fa8dc661c990b90f2fad3841b65ec23aaacc34d4bbe318a92f3c1bdb983ca70c416b4e13f6335b3a4609b4090fe0b4f45fa40a15277f790c88fe6a11476e
-
SSDEEP
6144:uE9fYb7tyBIBFPOofY+dZLomCu9PVDro/rTsKIknXjrxPmHQTNWekuMio:uEeHtJBFNYnKJro/rIKdXjF+w8Huo
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-