General
-
Target
9528f8cad2c0453c465eddc48c97e161a1532ab9d6e985bc8d29ccdb30bbcb89
-
Size
416KB
-
Sample
240507-ldyb3ada55
-
MD5
bc82c7d1b027af5292b681232bc16d63
-
SHA1
9fa7189ab3b1d8138cd06e5ec9d484caf1a071b1
-
SHA256
9528f8cad2c0453c465eddc48c97e161a1532ab9d6e985bc8d29ccdb30bbcb89
-
SHA512
4c740b580c6a71581afd84ea58c1c43ff316ead1beeaf06746721c063f2236823fa665ce5f37715bfd54ecac5ba20597b4a0204c95025f32f893d6c1818e12d2
-
SSDEEP
6144:Is39oglCbCdvUevlzUusNjv80uIGK87Veb4Ow93mKWLZmuMil:Is3+Ypvl5cv80FGKkOwStmul
Static task
static1
Behavioral task
behavioral1
Sample
9528f8cad2c0453c465eddc48c97e161a1532ab9d6e985bc8d29ccdb30bbcb89.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
9528f8cad2c0453c465eddc48c97e161a1532ab9d6e985bc8d29ccdb30bbcb89
-
Size
416KB
-
MD5
bc82c7d1b027af5292b681232bc16d63
-
SHA1
9fa7189ab3b1d8138cd06e5ec9d484caf1a071b1
-
SHA256
9528f8cad2c0453c465eddc48c97e161a1532ab9d6e985bc8d29ccdb30bbcb89
-
SHA512
4c740b580c6a71581afd84ea58c1c43ff316ead1beeaf06746721c063f2236823fa665ce5f37715bfd54ecac5ba20597b4a0204c95025f32f893d6c1818e12d2
-
SSDEEP
6144:Is39oglCbCdvUevlzUusNjv80uIGK87Veb4Ow93mKWLZmuMil:Is3+Ypvl5cv80FGKkOwStmul
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-