General
-
Target
bdd02fc4c900bfe9b923dd6ce12c6f130e7e15ed9e7a47a263276429dfaea9c4
-
Size
416KB
-
Sample
240507-k7w6eshh81
-
MD5
25d13f57ce8c8fc5ebf595a434c5bd7e
-
SHA1
a989ed2369c6f2d2740ad56333f122bdedcc394e
-
SHA256
bdd02fc4c900bfe9b923dd6ce12c6f130e7e15ed9e7a47a263276429dfaea9c4
-
SHA512
0e3beddcfeae3f71e0c4366f084dd43692c2cf789bd9bfd0410e33e81ee2bbbd990f63f9be136052af92c69170db859d7bd77cbaccd8ce62df26423b4ece9ed8
-
SSDEEP
6144:Is39oglCbCdvUevlzUusNjv80uIGK87Veb4Ow93mKWLZmuMiv:Is3+Ypvl5cv80FGKkOwStmuv
Static task
static1
Behavioral task
behavioral1
Sample
bdd02fc4c900bfe9b923dd6ce12c6f130e7e15ed9e7a47a263276429dfaea9c4.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
bdd02fc4c900bfe9b923dd6ce12c6f130e7e15ed9e7a47a263276429dfaea9c4
-
Size
416KB
-
MD5
25d13f57ce8c8fc5ebf595a434c5bd7e
-
SHA1
a989ed2369c6f2d2740ad56333f122bdedcc394e
-
SHA256
bdd02fc4c900bfe9b923dd6ce12c6f130e7e15ed9e7a47a263276429dfaea9c4
-
SHA512
0e3beddcfeae3f71e0c4366f084dd43692c2cf789bd9bfd0410e33e81ee2bbbd990f63f9be136052af92c69170db859d7bd77cbaccd8ce62df26423b4ece9ed8
-
SSDEEP
6144:Is39oglCbCdvUevlzUusNjv80uIGK87Veb4Ow93mKWLZmuMiv:Is3+Ypvl5cv80FGKkOwStmuv
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-