General
-
Target
929b4c620fbb3eefd458c2869b2830ac648151a6abf5d33c2666cafb35fa5d1e
-
Size
388KB
-
Sample
240510-3ds6saae78
-
MD5
94ffc96d37265d92da2406a89cc3758d
-
SHA1
b570efb0a6b5cf23cc8a19f48ff359b6156d27e8
-
SHA256
929b4c620fbb3eefd458c2869b2830ac648151a6abf5d33c2666cafb35fa5d1e
-
SHA512
0a6c3af80dc9243e5b9ea454268059a112d5c744568016c2924636e69d39e86c8ad3abeeba99bce801c00105b63bb80bb2388407cfe7123f0181ee5f6f0b1882
-
SSDEEP
12288:qDlQzUu8cUKdZN3QCUAWAOnxf3kBOtHKp1:qDqLU4zU9B3cOBKp1
Static task
static1
Behavioral task
behavioral1
Sample
929b4c620fbb3eefd458c2869b2830ac648151a6abf5d33c2666cafb35fa5d1e.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
929b4c620fbb3eefd458c2869b2830ac648151a6abf5d33c2666cafb35fa5d1e
-
Size
388KB
-
MD5
94ffc96d37265d92da2406a89cc3758d
-
SHA1
b570efb0a6b5cf23cc8a19f48ff359b6156d27e8
-
SHA256
929b4c620fbb3eefd458c2869b2830ac648151a6abf5d33c2666cafb35fa5d1e
-
SHA512
0a6c3af80dc9243e5b9ea454268059a112d5c744568016c2924636e69d39e86c8ad3abeeba99bce801c00105b63bb80bb2388407cfe7123f0181ee5f6f0b1882
-
SSDEEP
12288:qDlQzUu8cUKdZN3QCUAWAOnxf3kBOtHKp1:qDqLU4zU9B3cOBKp1
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-