General
-
Target
20a7dda844921b00f822d2fba4b82b54c61387e535ab157a0492457d6b889821
-
Size
372KB
-
Sample
240510-e4y8qabb3x
-
MD5
35d381b6ca2c1d6a41856a7a5e5f1d44
-
SHA1
cc71d45eb42b58deb32ca74d56b295eae7e0fc96
-
SHA256
20a7dda844921b00f822d2fba4b82b54c61387e535ab157a0492457d6b889821
-
SHA512
303a892690e4e280dce17377ee751497de52bc87fc2ce8a938f55d60c45deb9d86ef9883ac93029f47e674500fc450fcfa565a911e0c8c53223d21fdec52d5af
-
SSDEEP
6144:rte+TLYkD9ZWZImNMlYNOYa4JB4B4tTOgAKx9IvdYlhUHmnfKrbZJf:5L9ZWypUsaK4tTO+x9IFYjUGnkbZJf
Static task
static1
Behavioral task
behavioral1
Sample
20a7dda844921b00f822d2fba4b82b54c61387e535ab157a0492457d6b889821.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
20a7dda844921b00f822d2fba4b82b54c61387e535ab157a0492457d6b889821
-
Size
372KB
-
MD5
35d381b6ca2c1d6a41856a7a5e5f1d44
-
SHA1
cc71d45eb42b58deb32ca74d56b295eae7e0fc96
-
SHA256
20a7dda844921b00f822d2fba4b82b54c61387e535ab157a0492457d6b889821
-
SHA512
303a892690e4e280dce17377ee751497de52bc87fc2ce8a938f55d60c45deb9d86ef9883ac93029f47e674500fc450fcfa565a911e0c8c53223d21fdec52d5af
-
SSDEEP
6144:rte+TLYkD9ZWZImNMlYNOYa4JB4B4tTOgAKx9IvdYlhUHmnfKrbZJf:5L9ZWypUsaK4tTO+x9IFYjUGnkbZJf
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-