General
-
Target
5b223ac4e781b35089bcd173bc1134193e7060775690332d42a093f07df7a538
-
Size
382KB
-
Sample
240509-psfbkscf74
-
MD5
31e5f4083e6607d13eed7d7c729c031f
-
SHA1
d94095742dc62b47006a413bad007d3b57b90346
-
SHA256
5b223ac4e781b35089bcd173bc1134193e7060775690332d42a093f07df7a538
-
SHA512
60fa8b36768be11c7d2328ca717ec22e75aa2f1d0a5bf164ca995545ba12b715fcf36d970734f464799db811f0b161f94719443d92200734b12e3cb4479a3c2a
-
SSDEEP
6144:pjNz2z8NYkmBEv/WgU0wBmhekXHTXEdzE+eJKtl:pjN8WYJOjrutKJKtl
Static task
static1
Behavioral task
behavioral1
Sample
5b223ac4e781b35089bcd173bc1134193e7060775690332d42a093f07df7a538.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
5b223ac4e781b35089bcd173bc1134193e7060775690332d42a093f07df7a538
-
Size
382KB
-
MD5
31e5f4083e6607d13eed7d7c729c031f
-
SHA1
d94095742dc62b47006a413bad007d3b57b90346
-
SHA256
5b223ac4e781b35089bcd173bc1134193e7060775690332d42a093f07df7a538
-
SHA512
60fa8b36768be11c7d2328ca717ec22e75aa2f1d0a5bf164ca995545ba12b715fcf36d970734f464799db811f0b161f94719443d92200734b12e3cb4479a3c2a
-
SSDEEP
6144:pjNz2z8NYkmBEv/WgU0wBmhekXHTXEdzE+eJKtl:pjN8WYJOjrutKJKtl
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-