General
-
Target
0815dda7f6d93ec9b2cd2947cc11fb99f492b9bd5f426671f21a3cae12c497a1
-
Size
382KB
-
Sample
240509-pp53tsce39
-
MD5
0619997d751223f436bb593efbee9bbe
-
SHA1
641d1e1335d916b02d500022501e76552f4621b4
-
SHA256
0815dda7f6d93ec9b2cd2947cc11fb99f492b9bd5f426671f21a3cae12c497a1
-
SHA512
035d04c72b145dae90b11fb1687eeb80d0ca9aea49fab12d68ed3e22a04c9c2593c5b09acace378adde38e618a0976f7c4d9f66eb7b970f6f7f3564e551fb208
-
SSDEEP
6144:pjNz2z8NYkmBEv/WgU0wBmhekXHTXEdzE+eJKts:pjN8WYJOjrutKJKts
Static task
static1
Behavioral task
behavioral1
Sample
0815dda7f6d93ec9b2cd2947cc11fb99f492b9bd5f426671f21a3cae12c497a1.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
0815dda7f6d93ec9b2cd2947cc11fb99f492b9bd5f426671f21a3cae12c497a1
-
Size
382KB
-
MD5
0619997d751223f436bb593efbee9bbe
-
SHA1
641d1e1335d916b02d500022501e76552f4621b4
-
SHA256
0815dda7f6d93ec9b2cd2947cc11fb99f492b9bd5f426671f21a3cae12c497a1
-
SHA512
035d04c72b145dae90b11fb1687eeb80d0ca9aea49fab12d68ed3e22a04c9c2593c5b09acace378adde38e618a0976f7c4d9f66eb7b970f6f7f3564e551fb208
-
SSDEEP
6144:pjNz2z8NYkmBEv/WgU0wBmhekXHTXEdzE+eJKts:pjN8WYJOjrutKJKts
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-