General
-
Target
b9a4eddd2355b794a725261e6edccc52615f1b90c3b53f20bf55993dd425849d
-
Size
417KB
-
Sample
240507-l21r4abe2s
-
MD5
b213132a5da500333667266597314442
-
SHA1
4d0d36e7caf6a9f1d5b11d0c4d2a12de90d6d11f
-
SHA256
b9a4eddd2355b794a725261e6edccc52615f1b90c3b53f20bf55993dd425849d
-
SHA512
904f73be3337ff86ce4d473d98c151ca6521ad31dd406a99822b0ed5264ea8e79532f3a0ef71037cb1b5dd77a077b2ada7c1fafe8fe852f780a95fe1c7f854cb
-
SSDEEP
12288:0H9S9mUikIgN8hRxsG207aR7FPDROmjLtNeoDI:0d7mkRH7MJbjL5I
Static task
static1
Behavioral task
behavioral1
Sample
b9a4eddd2355b794a725261e6edccc52615f1b90c3b53f20bf55993dd425849d.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
b9a4eddd2355b794a725261e6edccc52615f1b90c3b53f20bf55993dd425849d
-
Size
417KB
-
MD5
b213132a5da500333667266597314442
-
SHA1
4d0d36e7caf6a9f1d5b11d0c4d2a12de90d6d11f
-
SHA256
b9a4eddd2355b794a725261e6edccc52615f1b90c3b53f20bf55993dd425849d
-
SHA512
904f73be3337ff86ce4d473d98c151ca6521ad31dd406a99822b0ed5264ea8e79532f3a0ef71037cb1b5dd77a077b2ada7c1fafe8fe852f780a95fe1c7f854cb
-
SSDEEP
12288:0H9S9mUikIgN8hRxsG207aR7FPDROmjLtNeoDI:0d7mkRH7MJbjL5I
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-