General
-
Target
29edd135817d2404003e64772a8e7488ebb599e8ed0be5767b55ef9c25e41b55
-
Size
384KB
-
Sample
240510-af1pesfb5z
-
MD5
7c8ebc6642015a83fc9e1540b7ced82f
-
SHA1
06abfd381281962c6153f670dea2ebec4842c0a9
-
SHA256
29edd135817d2404003e64772a8e7488ebb599e8ed0be5767b55ef9c25e41b55
-
SHA512
73e872264ea7ace92375472566bb8e5b51d981cc6c4333be583b1fe4ca762c63e5103927e7fbbedf4584adbbd7e504ad3788de946a9e4d2f07a04d8ad2655dba
-
SSDEEP
6144:WPhyrd5h3eOxlkRkIAXAQXNaHOnu1yPlWguHSQDuWWxP:WPh0tJ9XAQdQqGSKuDP
Static task
static1
Behavioral task
behavioral1
Sample
29edd135817d2404003e64772a8e7488ebb599e8ed0be5767b55ef9c25e41b55.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
29edd135817d2404003e64772a8e7488ebb599e8ed0be5767b55ef9c25e41b55
-
Size
384KB
-
MD5
7c8ebc6642015a83fc9e1540b7ced82f
-
SHA1
06abfd381281962c6153f670dea2ebec4842c0a9
-
SHA256
29edd135817d2404003e64772a8e7488ebb599e8ed0be5767b55ef9c25e41b55
-
SHA512
73e872264ea7ace92375472566bb8e5b51d981cc6c4333be583b1fe4ca762c63e5103927e7fbbedf4584adbbd7e504ad3788de946a9e4d2f07a04d8ad2655dba
-
SSDEEP
6144:WPhyrd5h3eOxlkRkIAXAQXNaHOnu1yPlWguHSQDuWWxP:WPh0tJ9XAQdQqGSKuDP
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-