General
-
Target
3e74588c0435af33331d75c5689c6c5480fd253292988009b3c68f8f4c89402b
-
Size
382KB
-
Sample
240509-p2vsmadb85
-
MD5
35e110c1676083a1a24f65624c714f5f
-
SHA1
93b1931633a7676345ecd3df284c3144fc6182bb
-
SHA256
3e74588c0435af33331d75c5689c6c5480fd253292988009b3c68f8f4c89402b
-
SHA512
9902eba36f5f6a64018d5074699ed508f49ee985d5ffa0eff5fb183095b0e4df21772afcd5bca04395d02bd20d82f8a89e7c53d00984d2ff5ba9fd8625ee5ce4
-
SSDEEP
6144:pjNz2z8NYkmBEv/WgU0wBmhekXHTXEdzE+eJKtv:pjN8WYJOjrutKJKtv
Static task
static1
Behavioral task
behavioral1
Sample
3e74588c0435af33331d75c5689c6c5480fd253292988009b3c68f8f4c89402b.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
3e74588c0435af33331d75c5689c6c5480fd253292988009b3c68f8f4c89402b
-
Size
382KB
-
MD5
35e110c1676083a1a24f65624c714f5f
-
SHA1
93b1931633a7676345ecd3df284c3144fc6182bb
-
SHA256
3e74588c0435af33331d75c5689c6c5480fd253292988009b3c68f8f4c89402b
-
SHA512
9902eba36f5f6a64018d5074699ed508f49ee985d5ffa0eff5fb183095b0e4df21772afcd5bca04395d02bd20d82f8a89e7c53d00984d2ff5ba9fd8625ee5ce4
-
SSDEEP
6144:pjNz2z8NYkmBEv/WgU0wBmhekXHTXEdzE+eJKtv:pjN8WYJOjrutKJKtv
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-