General
-
Target
cab0d7ad9a9d4ced74f7c7070e034640da31e13932a825619f07ab02d0b30863
-
Size
408KB
-
Sample
240507-pjr9safe3t
-
MD5
79836ad0dce2e4e2f4b943fa91add4db
-
SHA1
e64ec6d548b95c23bc4408f9222600d6addcc369
-
SHA256
cab0d7ad9a9d4ced74f7c7070e034640da31e13932a825619f07ab02d0b30863
-
SHA512
5c461b23a285de4675d20d6d0c5918e9907de6fa44929c1524755c62c61d875e8abb1a30d53c6479609f785393c47688a27f9577a7cbdfed304f6ac544ca59d1
-
SSDEEP
6144:b5cM23+UCrsxK18deKnuwQLRvB4GBx7jqlMM+0ljGkIX+BN5uATkshwxs:FBrsNe+mLRvdSL+0VRZDTks2xs
Static task
static1
Behavioral task
behavioral1
Sample
cab0d7ad9a9d4ced74f7c7070e034640da31e13932a825619f07ab02d0b30863.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
cab0d7ad9a9d4ced74f7c7070e034640da31e13932a825619f07ab02d0b30863
-
Size
408KB
-
MD5
79836ad0dce2e4e2f4b943fa91add4db
-
SHA1
e64ec6d548b95c23bc4408f9222600d6addcc369
-
SHA256
cab0d7ad9a9d4ced74f7c7070e034640da31e13932a825619f07ab02d0b30863
-
SHA512
5c461b23a285de4675d20d6d0c5918e9907de6fa44929c1524755c62c61d875e8abb1a30d53c6479609f785393c47688a27f9577a7cbdfed304f6ac544ca59d1
-
SSDEEP
6144:b5cM23+UCrsxK18deKnuwQLRvB4GBx7jqlMM+0ljGkIX+BN5uATkshwxs:FBrsNe+mLRvdSL+0VRZDTks2xs
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-