General
-
Target
acff8ea5b3ff6729acb72238e357355415819d0bc0086fe1fad5a58c3cf26a66
-
Size
416KB
-
Sample
240507-ld3lsada62
-
MD5
33cfaa17533044b7b03f7d22d5428b8f
-
SHA1
f4e894cb710fad344f16998035ba09ceedbe105f
-
SHA256
acff8ea5b3ff6729acb72238e357355415819d0bc0086fe1fad5a58c3cf26a66
-
SHA512
d9f80b355d84d7e1113521ee21e3fc852b1b8c89cd55b2871446286676fb3c9313f4f967a27edb57c1f4e03ca079c1404f5cf1d0b32f852761cfe9287205f18e
-
SSDEEP
6144:Is39oglCbCdvUevlzUusNjv80uIGK87Veb4Ow93mKWLZmuMis:Is3+Ypvl5cv80FGKkOwStmus
Static task
static1
Behavioral task
behavioral1
Sample
acff8ea5b3ff6729acb72238e357355415819d0bc0086fe1fad5a58c3cf26a66.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
acff8ea5b3ff6729acb72238e357355415819d0bc0086fe1fad5a58c3cf26a66
-
Size
416KB
-
MD5
33cfaa17533044b7b03f7d22d5428b8f
-
SHA1
f4e894cb710fad344f16998035ba09ceedbe105f
-
SHA256
acff8ea5b3ff6729acb72238e357355415819d0bc0086fe1fad5a58c3cf26a66
-
SHA512
d9f80b355d84d7e1113521ee21e3fc852b1b8c89cd55b2871446286676fb3c9313f4f967a27edb57c1f4e03ca079c1404f5cf1d0b32f852761cfe9287205f18e
-
SSDEEP
6144:Is39oglCbCdvUevlzUusNjv80uIGK87Veb4Ow93mKWLZmuMis:Is3+Ypvl5cv80FGKkOwStmus
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-