General
-
Target
30702ce8225b2fe24fe79588f3a598bd2b6fc6fd77e492dd20ef747e3b234103
-
Size
388KB
-
Sample
240510-29hjgsfd8x
-
MD5
2562d07c9213592d9a82e1752b48a299
-
SHA1
6c98a8af1793e99d96480f46cb317acad44efe2a
-
SHA256
30702ce8225b2fe24fe79588f3a598bd2b6fc6fd77e492dd20ef747e3b234103
-
SHA512
bc33237facafd0a6a095611676d3c1c3ef07c0a4648c7dfbaad0791a94cfa68b6a7f65f48fe26c9d801e074c0b422cdf28eb1b363c082c16ba0813baa7560601
-
SSDEEP
12288:qDlQzUu8cUKdZN3QCUAWAOnxf3kBOtHKp4:qDqLU4zU9B3cOBKp4
Static task
static1
Behavioral task
behavioral1
Sample
30702ce8225b2fe24fe79588f3a598bd2b6fc6fd77e492dd20ef747e3b234103.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
30702ce8225b2fe24fe79588f3a598bd2b6fc6fd77e492dd20ef747e3b234103
-
Size
388KB
-
MD5
2562d07c9213592d9a82e1752b48a299
-
SHA1
6c98a8af1793e99d96480f46cb317acad44efe2a
-
SHA256
30702ce8225b2fe24fe79588f3a598bd2b6fc6fd77e492dd20ef747e3b234103
-
SHA512
bc33237facafd0a6a095611676d3c1c3ef07c0a4648c7dfbaad0791a94cfa68b6a7f65f48fe26c9d801e074c0b422cdf28eb1b363c082c16ba0813baa7560601
-
SSDEEP
12288:qDlQzUu8cUKdZN3QCUAWAOnxf3kBOtHKp4:qDqLU4zU9B3cOBKp4
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-