General
-
Target
1933cc96d868b2f828079f50fc38bf5d3bba7394366a177ede4f2409ad7fd79e
-
Size
416KB
-
Sample
240507-k8ggcsaa3v
-
MD5
b23dd99107bf4f153ff538aad13e2843
-
SHA1
d440056bc2a643de694c503d0af03683406759a7
-
SHA256
1933cc96d868b2f828079f50fc38bf5d3bba7394366a177ede4f2409ad7fd79e
-
SHA512
2cb901af016e9b47b6674f6464eba15759c5605ab91228da622b9494eac58ec2ae6e40d1c126b424b049795c630f804042c92c72e2d5de1db0af9f5f24412c31
-
SSDEEP
6144:Is39oglCbCdvUevlzUusNjv80uIGK87Veb4Ow93mKWLZmuMio:Is3+Ypvl5cv80FGKkOwStmuo
Static task
static1
Behavioral task
behavioral1
Sample
1933cc96d868b2f828079f50fc38bf5d3bba7394366a177ede4f2409ad7fd79e.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
1933cc96d868b2f828079f50fc38bf5d3bba7394366a177ede4f2409ad7fd79e
-
Size
416KB
-
MD5
b23dd99107bf4f153ff538aad13e2843
-
SHA1
d440056bc2a643de694c503d0af03683406759a7
-
SHA256
1933cc96d868b2f828079f50fc38bf5d3bba7394366a177ede4f2409ad7fd79e
-
SHA512
2cb901af016e9b47b6674f6464eba15759c5605ab91228da622b9494eac58ec2ae6e40d1c126b424b049795c630f804042c92c72e2d5de1db0af9f5f24412c31
-
SSDEEP
6144:Is39oglCbCdvUevlzUusNjv80uIGK87Veb4Ow93mKWLZmuMio:Is3+Ypvl5cv80FGKkOwStmuo
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-