General
-
Target
c1f44ba9329e37b29ae039c0fc1d1018df4009ca79879c3e48d6ae4273c174d8
-
Size
388KB
-
Sample
240510-19c4bsfh25
-
MD5
89b8fa362dac3edfe558e0e157bf1d50
-
SHA1
6d37aad731b8c02d6f079ecc0e585dc7dcb5a69d
-
SHA256
c1f44ba9329e37b29ae039c0fc1d1018df4009ca79879c3e48d6ae4273c174d8
-
SHA512
890ceee57afd7eb2df0f91bacb4bf0d2b7d34ded36df3e7d702858d70e6cb2fb53bfb3c5a77386e0053a68db3098e444c563160bcc48b262b021eb0fc868d875
-
SSDEEP
12288:aG1ixU5HEhboNYNJHxqi4vdf4qLfxmGL8:aGMnhbvrHwi4vdAqL0GL8
Static task
static1
Behavioral task
behavioral1
Sample
c1f44ba9329e37b29ae039c0fc1d1018df4009ca79879c3e48d6ae4273c174d8.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
c1f44ba9329e37b29ae039c0fc1d1018df4009ca79879c3e48d6ae4273c174d8
-
Size
388KB
-
MD5
89b8fa362dac3edfe558e0e157bf1d50
-
SHA1
6d37aad731b8c02d6f079ecc0e585dc7dcb5a69d
-
SHA256
c1f44ba9329e37b29ae039c0fc1d1018df4009ca79879c3e48d6ae4273c174d8
-
SHA512
890ceee57afd7eb2df0f91bacb4bf0d2b7d34ded36df3e7d702858d70e6cb2fb53bfb3c5a77386e0053a68db3098e444c563160bcc48b262b021eb0fc868d875
-
SSDEEP
12288:aG1ixU5HEhboNYNJHxqi4vdf4qLfxmGL8:aGMnhbvrHwi4vdAqL0GL8
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-