General
-
Target
3f6a75bb0e76eb209aaa69f2049fb34addf1559881f0168c1aabf7bc8f5a520a
-
Size
388KB
-
Sample
240510-1xasfacb3x
-
MD5
a79e9a3ba1edb7ffbf8cf963e33a4162
-
SHA1
d85a328dbdcfb9bbd07a1829ac2073f823ae9b79
-
SHA256
3f6a75bb0e76eb209aaa69f2049fb34addf1559881f0168c1aabf7bc8f5a520a
-
SHA512
549e043e7c0f9d3a5f07a182a11a86ed4531d6dbb4e9a8d605cf6cc56c0ba8e66a4223e4662178c1dee56eb4d7353dd76e78e532b667522468bc421c90a43a2b
-
SSDEEP
12288:aG1ixU5HEhboNYNJHxqi4vdf4qLfxmGL/:aGMnhbvrHwi4vdAqL0GL/
Static task
static1
Behavioral task
behavioral1
Sample
3f6a75bb0e76eb209aaa69f2049fb34addf1559881f0168c1aabf7bc8f5a520a.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
3f6a75bb0e76eb209aaa69f2049fb34addf1559881f0168c1aabf7bc8f5a520a
-
Size
388KB
-
MD5
a79e9a3ba1edb7ffbf8cf963e33a4162
-
SHA1
d85a328dbdcfb9bbd07a1829ac2073f823ae9b79
-
SHA256
3f6a75bb0e76eb209aaa69f2049fb34addf1559881f0168c1aabf7bc8f5a520a
-
SHA512
549e043e7c0f9d3a5f07a182a11a86ed4531d6dbb4e9a8d605cf6cc56c0ba8e66a4223e4662178c1dee56eb4d7353dd76e78e532b667522468bc421c90a43a2b
-
SSDEEP
12288:aG1ixU5HEhboNYNJHxqi4vdf4qLfxmGL/:aGMnhbvrHwi4vdAqL0GL/
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-