General
-
Target
38feae3c8916d00891fd5338901a2798ad5ce6eb72b29c15515b3f2093e6c237
-
Size
417KB
-
Sample
240507-l5rnlaeb96
-
MD5
0555b058b467a98642f269a4813ff842
-
SHA1
e625fa04294d68a5deede8959a83cfeb8f8bff80
-
SHA256
38feae3c8916d00891fd5338901a2798ad5ce6eb72b29c15515b3f2093e6c237
-
SHA512
9d4875cdeaf814df36d30340f28bee221a6a6f6c486628f3f2f11a120f13221ae6f9d9ea27c80936144523f116aa1b51a5db73333d1875dc252be86b6f8c62a1
-
SSDEEP
12288:0H9S9mUikIgN8hRxsG207aR7FPDROmjLtNeoDF:0d7mkRH7MJbjL5F
Static task
static1
Behavioral task
behavioral1
Sample
38feae3c8916d00891fd5338901a2798ad5ce6eb72b29c15515b3f2093e6c237.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
38feae3c8916d00891fd5338901a2798ad5ce6eb72b29c15515b3f2093e6c237
-
Size
417KB
-
MD5
0555b058b467a98642f269a4813ff842
-
SHA1
e625fa04294d68a5deede8959a83cfeb8f8bff80
-
SHA256
38feae3c8916d00891fd5338901a2798ad5ce6eb72b29c15515b3f2093e6c237
-
SHA512
9d4875cdeaf814df36d30340f28bee221a6a6f6c486628f3f2f11a120f13221ae6f9d9ea27c80936144523f116aa1b51a5db73333d1875dc252be86b6f8c62a1
-
SSDEEP
12288:0H9S9mUikIgN8hRxsG207aR7FPDROmjLtNeoDF:0d7mkRH7MJbjL5F
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-