General
-
Target
2542caf838203c42ae6f7a21dc2243d50367bdbaab0d14d11e6cc89a1f926927
-
Size
408KB
-
Sample
240507-ppm71sad52
-
MD5
e4f54147f4e172d62ac1b56c94af6bd8
-
SHA1
cc4662852fe8f3d5f3fe330813edf4ae4f7b6a82
-
SHA256
2542caf838203c42ae6f7a21dc2243d50367bdbaab0d14d11e6cc89a1f926927
-
SHA512
aebc6a0f89d450ef7040f68d5c3e0b586f04ef186ca160a85a86afd08a233b0d957695fec6c7d7851fb68811bf7ad0cef15835327062951b3dd1dd47200db686
-
SSDEEP
6144:b5cM23+UCrsxK18deKnuwQLRvB4GBx7jqlMM+0ljGkIX+BN5uATkshwxl:FBrsNe+mLRvdSL+0VRZDTks2xl
Static task
static1
Behavioral task
behavioral1
Sample
2542caf838203c42ae6f7a21dc2243d50367bdbaab0d14d11e6cc89a1f926927.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
2542caf838203c42ae6f7a21dc2243d50367bdbaab0d14d11e6cc89a1f926927
-
Size
408KB
-
MD5
e4f54147f4e172d62ac1b56c94af6bd8
-
SHA1
cc4662852fe8f3d5f3fe330813edf4ae4f7b6a82
-
SHA256
2542caf838203c42ae6f7a21dc2243d50367bdbaab0d14d11e6cc89a1f926927
-
SHA512
aebc6a0f89d450ef7040f68d5c3e0b586f04ef186ca160a85a86afd08a233b0d957695fec6c7d7851fb68811bf7ad0cef15835327062951b3dd1dd47200db686
-
SSDEEP
6144:b5cM23+UCrsxK18deKnuwQLRvB4GBx7jqlMM+0ljGkIX+BN5uATkshwxl:FBrsNe+mLRvdSL+0VRZDTks2xl
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-