General
-
Target
0ea982d04a4751e6c847e317979e29c2f7f9f3f9d203b48dec92858af2df93db
-
Size
388KB
-
Sample
240510-3bn42sff5x
-
MD5
9993432b198916c205186cea15816304
-
SHA1
da2529aea760be16581ebd12681128524e88a49a
-
SHA256
0ea982d04a4751e6c847e317979e29c2f7f9f3f9d203b48dec92858af2df93db
-
SHA512
38d55109d9ecbdaf6f73a73335d5a26991cf94fe4d5029be889d7d43a7a78e9971701f2e14949a7b0fc67c726bc1dc39235514086778b4fda21f8027ee8be3d9
-
SSDEEP
12288:qDlQzUu8cUKdZN3QCUAWAOnxf3kBOtHKp/:qDqLU4zU9B3cOBKp/
Static task
static1
Behavioral task
behavioral1
Sample
0ea982d04a4751e6c847e317979e29c2f7f9f3f9d203b48dec92858af2df93db.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
0ea982d04a4751e6c847e317979e29c2f7f9f3f9d203b48dec92858af2df93db
-
Size
388KB
-
MD5
9993432b198916c205186cea15816304
-
SHA1
da2529aea760be16581ebd12681128524e88a49a
-
SHA256
0ea982d04a4751e6c847e317979e29c2f7f9f3f9d203b48dec92858af2df93db
-
SHA512
38d55109d9ecbdaf6f73a73335d5a26991cf94fe4d5029be889d7d43a7a78e9971701f2e14949a7b0fc67c726bc1dc39235514086778b4fda21f8027ee8be3d9
-
SSDEEP
12288:qDlQzUu8cUKdZN3QCUAWAOnxf3kBOtHKp/:qDqLU4zU9B3cOBKp/
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-