General
-
Target
714f148fca76fffff45d10e8b8c70c293fdd7b3222a55981a150ad596695e5a8
-
Size
384KB
-
Sample
240510-aaqbhaef9x
-
MD5
a5cd431c49ff36cd15256679be4c9425
-
SHA1
576a7937c023192dffdefb4d55256e7c2685b080
-
SHA256
714f148fca76fffff45d10e8b8c70c293fdd7b3222a55981a150ad596695e5a8
-
SHA512
f297995d7c047073576b6b943c4ede935d0fe91b43fb141dea374eb5011ad568f551d10ac76a01287a22bd6b125d7fac5dacfb530c071a3618dacc163a19304d
-
SSDEEP
6144:WPhyrd5h3eOxlkRkIAXAQXNaHOnu1yPlWguHSQDuWWxI:WPh0tJ9XAQdQqGSKuDI
Static task
static1
Behavioral task
behavioral1
Sample
714f148fca76fffff45d10e8b8c70c293fdd7b3222a55981a150ad596695e5a8.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
714f148fca76fffff45d10e8b8c70c293fdd7b3222a55981a150ad596695e5a8
-
Size
384KB
-
MD5
a5cd431c49ff36cd15256679be4c9425
-
SHA1
576a7937c023192dffdefb4d55256e7c2685b080
-
SHA256
714f148fca76fffff45d10e8b8c70c293fdd7b3222a55981a150ad596695e5a8
-
SHA512
f297995d7c047073576b6b943c4ede935d0fe91b43fb141dea374eb5011ad568f551d10ac76a01287a22bd6b125d7fac5dacfb530c071a3618dacc163a19304d
-
SSDEEP
6144:WPhyrd5h3eOxlkRkIAXAQXNaHOnu1yPlWguHSQDuWWxI:WPh0tJ9XAQdQqGSKuDI
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-