General
-
Target
76f8d48b1be2076cdba4e2443e8c78d8d08e2f65ba4db579b30f65cf626e49f3
-
Size
408KB
-
Sample
240507-phjk9afd7y
-
MD5
47dc665548c0117a799e2c6fd62029d5
-
SHA1
3b124afd06debf01fee518e7eccbcccfac75381b
-
SHA256
76f8d48b1be2076cdba4e2443e8c78d8d08e2f65ba4db579b30f65cf626e49f3
-
SHA512
739f537eb5524d99ce4fc64d149f698602e978bb193f9429291abd5f84f3346a50163ac7104657c2182b6886a1555af822475009cc9af53129d4e7bccf1528cc
-
SSDEEP
6144:b5cM23+UCrsxK18deKnuwQLRvB4GBx7jqlMM+0ljGkIX+BN5uATkshwxo:FBrsNe+mLRvdSL+0VRZDTks2xo
Static task
static1
Behavioral task
behavioral1
Sample
76f8d48b1be2076cdba4e2443e8c78d8d08e2f65ba4db579b30f65cf626e49f3.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
76f8d48b1be2076cdba4e2443e8c78d8d08e2f65ba4db579b30f65cf626e49f3
-
Size
408KB
-
MD5
47dc665548c0117a799e2c6fd62029d5
-
SHA1
3b124afd06debf01fee518e7eccbcccfac75381b
-
SHA256
76f8d48b1be2076cdba4e2443e8c78d8d08e2f65ba4db579b30f65cf626e49f3
-
SHA512
739f537eb5524d99ce4fc64d149f698602e978bb193f9429291abd5f84f3346a50163ac7104657c2182b6886a1555af822475009cc9af53129d4e7bccf1528cc
-
SSDEEP
6144:b5cM23+UCrsxK18deKnuwQLRvB4GBx7jqlMM+0ljGkIX+BN5uATkshwxo:FBrsNe+mLRvdSL+0VRZDTks2xo
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-