General
-
Target
8f87b01c08da6c2cfaac6ac981a1d12542bf35a812badaa7ba224954f8de0d53
-
Size
403KB
-
Sample
240508-aa4twsfe7z
-
MD5
051afec86eae8b0ba56145dde9fa5179
-
SHA1
52c75be59942e10156e4f0d6c58221fbd46288a6
-
SHA256
8f87b01c08da6c2cfaac6ac981a1d12542bf35a812badaa7ba224954f8de0d53
-
SHA512
88c8407ef6d56e6b0330fc20f953fe6bf4e6e5ed9431b1c6062a0e363415115e96b59027c743f28e2da47864bdcc9dd3ad32f11013b9f64e667488748188fca0
-
SSDEEP
6144:psA3pbjuJg1hDDcvytIS1Kq0j9Or2rGIJl5KBFRvDHf4:psmpbjuJgzbh0BO6Vl0Vvj4
Static task
static1
Behavioral task
behavioral1
Sample
8f87b01c08da6c2cfaac6ac981a1d12542bf35a812badaa7ba224954f8de0d53.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
8f87b01c08da6c2cfaac6ac981a1d12542bf35a812badaa7ba224954f8de0d53
-
Size
403KB
-
MD5
051afec86eae8b0ba56145dde9fa5179
-
SHA1
52c75be59942e10156e4f0d6c58221fbd46288a6
-
SHA256
8f87b01c08da6c2cfaac6ac981a1d12542bf35a812badaa7ba224954f8de0d53
-
SHA512
88c8407ef6d56e6b0330fc20f953fe6bf4e6e5ed9431b1c6062a0e363415115e96b59027c743f28e2da47864bdcc9dd3ad32f11013b9f64e667488748188fca0
-
SSDEEP
6144:psA3pbjuJg1hDDcvytIS1Kq0j9Or2rGIJl5KBFRvDHf4:psmpbjuJgzbh0BO6Vl0Vvj4
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-