General
-
Target
e43535ac108378521826695ae572ea24b4cde1a78b0016d3b5ebe82ff5934535
-
Size
384KB
-
Sample
240510-ax9nnabe77
-
MD5
8ff1083b2490429a4ea0ecf8f5542c8c
-
SHA1
70ebf9b87666aab4db253e98e845ea440602a4cc
-
SHA256
e43535ac108378521826695ae572ea24b4cde1a78b0016d3b5ebe82ff5934535
-
SHA512
c2f4d386f0b46ed9ed0716e3df086afb3ed360ea3afb74cb3dc0369311088332ae037269575722d5f60a12be9a242f505d32440ed294ad5170ec315c588b3c5c
-
SSDEEP
6144:ujfcaXBXkd86TbOMLd1KsPTNqG5Tcq9kdilO1SnO3IExI:87XN6T9RpRAq3O1SnQ3I
Static task
static1
Behavioral task
behavioral1
Sample
e43535ac108378521826695ae572ea24b4cde1a78b0016d3b5ebe82ff5934535.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
e43535ac108378521826695ae572ea24b4cde1a78b0016d3b5ebe82ff5934535
-
Size
384KB
-
MD5
8ff1083b2490429a4ea0ecf8f5542c8c
-
SHA1
70ebf9b87666aab4db253e98e845ea440602a4cc
-
SHA256
e43535ac108378521826695ae572ea24b4cde1a78b0016d3b5ebe82ff5934535
-
SHA512
c2f4d386f0b46ed9ed0716e3df086afb3ed360ea3afb74cb3dc0369311088332ae037269575722d5f60a12be9a242f505d32440ed294ad5170ec315c588b3c5c
-
SSDEEP
6144:ujfcaXBXkd86TbOMLd1KsPTNqG5Tcq9kdilO1SnO3IExI:87XN6T9RpRAq3O1SnQ3I
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-