General
-
Target
8773907e6db3869856293c19c8fbee567854ca17e8c4dd580ee8a05fe3f1b0a7
-
Size
384KB
-
Sample
240510-azcfyage3v
-
MD5
58abc76e3bf16ebe939c3fb841129b5b
-
SHA1
8860684923c2d64551ca6175ea63e34e11e89599
-
SHA256
8773907e6db3869856293c19c8fbee567854ca17e8c4dd580ee8a05fe3f1b0a7
-
SHA512
ab3964c57c1ce0b4db2da147b40f0c058b65848c4fe21a7fc4f6fa026378d7b0861005a4111a9ea469245b0ff75d31c3db3550204951783637a77e2c559a4aef
-
SSDEEP
6144:ujfcaXBXkd86TbOMLd1KsPTNqG5Tcq9kdilO1SnO3IExP:87XN6T9RpRAq3O1SnQ3P
Static task
static1
Behavioral task
behavioral1
Sample
8773907e6db3869856293c19c8fbee567854ca17e8c4dd580ee8a05fe3f1b0a7.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
8773907e6db3869856293c19c8fbee567854ca17e8c4dd580ee8a05fe3f1b0a7
-
Size
384KB
-
MD5
58abc76e3bf16ebe939c3fb841129b5b
-
SHA1
8860684923c2d64551ca6175ea63e34e11e89599
-
SHA256
8773907e6db3869856293c19c8fbee567854ca17e8c4dd580ee8a05fe3f1b0a7
-
SHA512
ab3964c57c1ce0b4db2da147b40f0c058b65848c4fe21a7fc4f6fa026378d7b0861005a4111a9ea469245b0ff75d31c3db3550204951783637a77e2c559a4aef
-
SSDEEP
6144:ujfcaXBXkd86TbOMLd1KsPTNqG5Tcq9kdilO1SnO3IExP:87XN6T9RpRAq3O1SnQ3P
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-