General
-
Target
2a7a431bf67a89aece1b155fc2a21dc66c17ed6dd4d310006240d14ef5f3cc20
-
Size
388KB
-
Sample
240510-1wn9faeh95
-
MD5
955a51e6eb69e7a8a567b3b90a254349
-
SHA1
dc9848c35eb27dda95699ec492b05913efd64aed
-
SHA256
2a7a431bf67a89aece1b155fc2a21dc66c17ed6dd4d310006240d14ef5f3cc20
-
SHA512
a64bf9f444df71f92c4559d37bfc657b35afbdc2ce1408b02d6f27b5e7cef71ead4b56fbf9f5e73870810823bedc74f1035f4a99363b7ab8374e8401f4b3a9d1
-
SSDEEP
12288:aG1ixU5HEhboNYNJHxqi4vdf4qLfxmGL1:aGMnhbvrHwi4vdAqL0GL1
Static task
static1
Behavioral task
behavioral1
Sample
2a7a431bf67a89aece1b155fc2a21dc66c17ed6dd4d310006240d14ef5f3cc20.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
2a7a431bf67a89aece1b155fc2a21dc66c17ed6dd4d310006240d14ef5f3cc20
-
Size
388KB
-
MD5
955a51e6eb69e7a8a567b3b90a254349
-
SHA1
dc9848c35eb27dda95699ec492b05913efd64aed
-
SHA256
2a7a431bf67a89aece1b155fc2a21dc66c17ed6dd4d310006240d14ef5f3cc20
-
SHA512
a64bf9f444df71f92c4559d37bfc657b35afbdc2ce1408b02d6f27b5e7cef71ead4b56fbf9f5e73870810823bedc74f1035f4a99363b7ab8374e8401f4b3a9d1
-
SSDEEP
12288:aG1ixU5HEhboNYNJHxqi4vdf4qLfxmGL1:aGMnhbvrHwi4vdAqL0GL1
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-