General
-
Target
cd54b20bc9cb3de619478bce043578ba0cb1dbabd6ba736d139b42177be4f67d
-
Size
407KB
-
Sample
240507-p1fx3sah96
-
MD5
3341b8143237f90be957bc0e9d349119
-
SHA1
85e1092c18a01c05a72d8a14d015313f1343d26e
-
SHA256
cd54b20bc9cb3de619478bce043578ba0cb1dbabd6ba736d139b42177be4f67d
-
SHA512
f6162e7d51c4dab6ae059231ded1fda9f51773633d5799b3dd3a76673e4adc3685022abb44e4cd9598d6eb3613d7731a4c26c81ff06512ad3ef9f05e63f33210
-
SSDEEP
6144:TRJCasp2zJZshZ3ZBtPeWNk/GW5qqSODl+40hwxv:uaVYPnYAqwp2xv
Static task
static1
Behavioral task
behavioral1
Sample
cd54b20bc9cb3de619478bce043578ba0cb1dbabd6ba736d139b42177be4f67d.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
cd54b20bc9cb3de619478bce043578ba0cb1dbabd6ba736d139b42177be4f67d
-
Size
407KB
-
MD5
3341b8143237f90be957bc0e9d349119
-
SHA1
85e1092c18a01c05a72d8a14d015313f1343d26e
-
SHA256
cd54b20bc9cb3de619478bce043578ba0cb1dbabd6ba736d139b42177be4f67d
-
SHA512
f6162e7d51c4dab6ae059231ded1fda9f51773633d5799b3dd3a76673e4adc3685022abb44e4cd9598d6eb3613d7731a4c26c81ff06512ad3ef9f05e63f33210
-
SSDEEP
6144:TRJCasp2zJZshZ3ZBtPeWNk/GW5qqSODl+40hwxv:uaVYPnYAqwp2xv
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-