General
-
Target
238d0d09a81e5d184f21b0f8df90fda6ba74973713dc15996f0acafba1d249d6
-
Size
384KB
-
Sample
240509-31227sef6w
-
MD5
f168f91f007f6154e63d3bc20f540ab6
-
SHA1
4280fff35cbf4b248ce36a163075610cd8237405
-
SHA256
238d0d09a81e5d184f21b0f8df90fda6ba74973713dc15996f0acafba1d249d6
-
SHA512
e853bfb50c140f164161047dc60a5bfc2e2afeba0bceff4f26eaf54d9cc45e4eeacdd8875c61ee5b0a58a87d6c74e3ce45870c2792c52325742ace16890af6f0
-
SSDEEP
12288:lvNMaEOh22VwmtX3FLa16B3FuOx6LiBwwI:lVrs25X3V66BoOxvVI
Static task
static1
Behavioral task
behavioral1
Sample
238d0d09a81e5d184f21b0f8df90fda6ba74973713dc15996f0acafba1d249d6.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
238d0d09a81e5d184f21b0f8df90fda6ba74973713dc15996f0acafba1d249d6
-
Size
384KB
-
MD5
f168f91f007f6154e63d3bc20f540ab6
-
SHA1
4280fff35cbf4b248ce36a163075610cd8237405
-
SHA256
238d0d09a81e5d184f21b0f8df90fda6ba74973713dc15996f0acafba1d249d6
-
SHA512
e853bfb50c140f164161047dc60a5bfc2e2afeba0bceff4f26eaf54d9cc45e4eeacdd8875c61ee5b0a58a87d6c74e3ce45870c2792c52325742ace16890af6f0
-
SSDEEP
12288:lvNMaEOh22VwmtX3FLa16B3FuOx6LiBwwI:lVrs25X3V66BoOxvVI
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-