General
-
Target
f000cf9df04caf982a587f04d727fad5be0716146827a46e9e3cdc299952829d
-
Size
406KB
-
Sample
240509-3pbqwaha89
-
MD5
8c119343e6bf0180eebef7023c6dd30a
-
SHA1
edd4dbb9fe569cdf6bd427c4397005876ccca575
-
SHA256
f000cf9df04caf982a587f04d727fad5be0716146827a46e9e3cdc299952829d
-
SHA512
4e890229827cf489b0fbc917a688bba239e635e6a53f05b3c55186bd564f06d0e71bde53311be312056fb4382c7c623cc0eb0326aa66f579a68aecf46c2c6c8d
-
SSDEEP
6144:cGGgSwmijoz/lKRqjAMR2lnaID8lGQfVhW9N1:Qg7LjItKQMi1O8lbS/1
Static task
static1
Behavioral task
behavioral1
Sample
f000cf9df04caf982a587f04d727fad5be0716146827a46e9e3cdc299952829d.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
f000cf9df04caf982a587f04d727fad5be0716146827a46e9e3cdc299952829d
-
Size
406KB
-
MD5
8c119343e6bf0180eebef7023c6dd30a
-
SHA1
edd4dbb9fe569cdf6bd427c4397005876ccca575
-
SHA256
f000cf9df04caf982a587f04d727fad5be0716146827a46e9e3cdc299952829d
-
SHA512
4e890229827cf489b0fbc917a688bba239e635e6a53f05b3c55186bd564f06d0e71bde53311be312056fb4382c7c623cc0eb0326aa66f579a68aecf46c2c6c8d
-
SSDEEP
6144:cGGgSwmijoz/lKRqjAMR2lnaID8lGQfVhW9N1:Qg7LjItKQMi1O8lbS/1
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-