General
-
Target
b97edba2e0e81b4cc7d99a6776f80d50ce46952680c71b06428f6a3206c366f7
-
Size
416KB
-
Sample
240509-3efbbada7w
-
MD5
7b2875cb05e2096cdff530aa2b6fc6fc
-
SHA1
3db46544f57870426eaee8aa07bdd1e605c54b29
-
SHA256
b97edba2e0e81b4cc7d99a6776f80d50ce46952680c71b06428f6a3206c366f7
-
SHA512
0e0208f81195b6e5c3c01e2bed1cf38fb9221b0c86190da4e77763880da21d1b5f81c142dfcf27ee6ba8d7ff3383d1417d466a28c5bdc2f13a0dd498f4928441
-
SSDEEP
6144:xNDSLZK+bH6tSYLDidexnCihNJnrWXy1JFIHbP3ShohW90F:LSLZKK/dCCibRz4PiLaF
Static task
static1
Behavioral task
behavioral1
Sample
b97edba2e0e81b4cc7d99a6776f80d50ce46952680c71b06428f6a3206c366f7.exe
Resource
win7-20240215-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
b97edba2e0e81b4cc7d99a6776f80d50ce46952680c71b06428f6a3206c366f7
-
Size
416KB
-
MD5
7b2875cb05e2096cdff530aa2b6fc6fc
-
SHA1
3db46544f57870426eaee8aa07bdd1e605c54b29
-
SHA256
b97edba2e0e81b4cc7d99a6776f80d50ce46952680c71b06428f6a3206c366f7
-
SHA512
0e0208f81195b6e5c3c01e2bed1cf38fb9221b0c86190da4e77763880da21d1b5f81c142dfcf27ee6ba8d7ff3383d1417d466a28c5bdc2f13a0dd498f4928441
-
SSDEEP
6144:xNDSLZK+bH6tSYLDidexnCihNJnrWXy1JFIHbP3ShohW90F:LSLZKK/dCCibRz4PiLaF
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-