General
-
Target
0289c93b052c75bfa89ced81e2d0dcd1778d7b6123eb55ea9d9713c3d6950bc7
-
Size
384KB
-
Sample
240509-3r6c9shc68
-
MD5
43264cd42595772d0adb93101b527941
-
SHA1
40e5fe656af1f66d191b617bf970ec6271ed59e9
-
SHA256
0289c93b052c75bfa89ced81e2d0dcd1778d7b6123eb55ea9d9713c3d6950bc7
-
SHA512
1e6d8b5e64dda611107de0f97d19f4bb347458f78b0c11f469572cca8e9c489407847cba42c4668d42f868292bb647543b41d1270f6b0c3283e9ab6a192cdbd1
-
SSDEEP
12288:lvNMaEOh22VwmtX3FLa16B3FuOx6LiBwwF:lVrs25X3V66BoOxvVF
Static task
static1
Behavioral task
behavioral1
Sample
0289c93b052c75bfa89ced81e2d0dcd1778d7b6123eb55ea9d9713c3d6950bc7.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
0289c93b052c75bfa89ced81e2d0dcd1778d7b6123eb55ea9d9713c3d6950bc7
-
Size
384KB
-
MD5
43264cd42595772d0adb93101b527941
-
SHA1
40e5fe656af1f66d191b617bf970ec6271ed59e9
-
SHA256
0289c93b052c75bfa89ced81e2d0dcd1778d7b6123eb55ea9d9713c3d6950bc7
-
SHA512
1e6d8b5e64dda611107de0f97d19f4bb347458f78b0c11f469572cca8e9c489407847cba42c4668d42f868292bb647543b41d1270f6b0c3283e9ab6a192cdbd1
-
SSDEEP
12288:lvNMaEOh22VwmtX3FLa16B3FuOx6LiBwwF:lVrs25X3V66BoOxvVF
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-