General
-
Target
f30f30f904872d74547a81b4d6ed6dfd57ec0602de595bedb098281ac886954f
-
Size
384KB
-
Sample
240510-awag6sgc4s
-
MD5
781b319373a1ceaf8d629467af244f95
-
SHA1
bd277cc36925b4f0717a15230d11d7a1f6663a01
-
SHA256
f30f30f904872d74547a81b4d6ed6dfd57ec0602de595bedb098281ac886954f
-
SHA512
3cfef8762b5d5db02247705f0edc1b568a7d1cb045616a199a1dd7735ed45fd56ddc857b307a0de2ca00d11913dec36a15ab7b7e65d2bd9442e3ddc6678d0cc4
-
SSDEEP
6144:ujfcaXBXkd86TbOMLd1KsPTNqG5Tcq9kdilO1SnO3IExF:87XN6T9RpRAq3O1SnQ3F
Static task
static1
Behavioral task
behavioral1
Sample
f30f30f904872d74547a81b4d6ed6dfd57ec0602de595bedb098281ac886954f.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
f30f30f904872d74547a81b4d6ed6dfd57ec0602de595bedb098281ac886954f
-
Size
384KB
-
MD5
781b319373a1ceaf8d629467af244f95
-
SHA1
bd277cc36925b4f0717a15230d11d7a1f6663a01
-
SHA256
f30f30f904872d74547a81b4d6ed6dfd57ec0602de595bedb098281ac886954f
-
SHA512
3cfef8762b5d5db02247705f0edc1b568a7d1cb045616a199a1dd7735ed45fd56ddc857b307a0de2ca00d11913dec36a15ab7b7e65d2bd9442e3ddc6678d0cc4
-
SSDEEP
6144:ujfcaXBXkd86TbOMLd1KsPTNqG5Tcq9kdilO1SnO3IExF:87XN6T9RpRAq3O1SnQ3F
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-