General
-
Target
4fa5db7496054fe5846d2676cf4d95c5b3f50744acc8cf3b8ba16852480f05e6
-
Size
407KB
-
Sample
240507-pzskgsgc6z
-
MD5
9797eea799a3fea1c6afbed74a6b944a
-
SHA1
9efbdfa9545f549948b874a6dd7555f4dd5a60f2
-
SHA256
4fa5db7496054fe5846d2676cf4d95c5b3f50744acc8cf3b8ba16852480f05e6
-
SHA512
689cb81caad25f21671c034c3456e3e83927b261f10c4a92646ba910169ca9a4324de0c5c21148dc7a42bdec64d5e6b30945af8e7beecc5367493e8b6e55f6c9
-
SSDEEP
6144:TRJCasp2zJZshZ3ZBtPeWNk/GW5qqSODl+40hwxo:uaVYPnYAqwp2xo
Static task
static1
Behavioral task
behavioral1
Sample
4fa5db7496054fe5846d2676cf4d95c5b3f50744acc8cf3b8ba16852480f05e6.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
4fa5db7496054fe5846d2676cf4d95c5b3f50744acc8cf3b8ba16852480f05e6
-
Size
407KB
-
MD5
9797eea799a3fea1c6afbed74a6b944a
-
SHA1
9efbdfa9545f549948b874a6dd7555f4dd5a60f2
-
SHA256
4fa5db7496054fe5846d2676cf4d95c5b3f50744acc8cf3b8ba16852480f05e6
-
SHA512
689cb81caad25f21671c034c3456e3e83927b261f10c4a92646ba910169ca9a4324de0c5c21148dc7a42bdec64d5e6b30945af8e7beecc5367493e8b6e55f6c9
-
SSDEEP
6144:TRJCasp2zJZshZ3ZBtPeWNk/GW5qqSODl+40hwxo:uaVYPnYAqwp2xo
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-