General
-
Target
1e7e29f84233f8aa853f3d1c85c4c2eae460930928e98c5fc98cc86efd3cf314
-
Size
371KB
-
Sample
240510-f8tz8shb69
-
MD5
e6eed9679b179e860c5c82fc27834af4
-
SHA1
7954ed118d724c11efa4e683449c60ebd66aeb2c
-
SHA256
1e7e29f84233f8aa853f3d1c85c4c2eae460930928e98c5fc98cc86efd3cf314
-
SHA512
4762792a2b1821eb2800be5c933c55126fa30c1a0efe4008bc1ecd504ba7a874648533fce750e3738617ba708f8719ad2abe9b05adbb273b68950dbd66bf5274
-
SSDEEP
6144:aURdZSI5nrUscjLhfKpWrx+5nvyIuT/GODYYTJm/:aU7ZSI5ELkpixsnluT/GOnk/
Static task
static1
Behavioral task
behavioral1
Sample
1e7e29f84233f8aa853f3d1c85c4c2eae460930928e98c5fc98cc86efd3cf314.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
1e7e29f84233f8aa853f3d1c85c4c2eae460930928e98c5fc98cc86efd3cf314
-
Size
371KB
-
MD5
e6eed9679b179e860c5c82fc27834af4
-
SHA1
7954ed118d724c11efa4e683449c60ebd66aeb2c
-
SHA256
1e7e29f84233f8aa853f3d1c85c4c2eae460930928e98c5fc98cc86efd3cf314
-
SHA512
4762792a2b1821eb2800be5c933c55126fa30c1a0efe4008bc1ecd504ba7a874648533fce750e3738617ba708f8719ad2abe9b05adbb273b68950dbd66bf5274
-
SSDEEP
6144:aURdZSI5nrUscjLhfKpWrx+5nvyIuT/GODYYTJm/:aU7ZSI5ELkpixsnluT/GOnk/
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-