General
-
Target
ec9955db0e61093b92486cf30fe05682f64e97f698283d88c6df88540dd24e82
-
Size
371KB
-
Sample
240510-f9dpmshc23
-
MD5
5dc885cbc93b0b51f57804898d5d7e29
-
SHA1
2d49b75f7bb52bd9b634f57034bf4d9bedfa734b
-
SHA256
ec9955db0e61093b92486cf30fe05682f64e97f698283d88c6df88540dd24e82
-
SHA512
c4beb5ddac819f939aed07a0b416efef3d65dbd4a2e339b32858bc6661ad37f27306bbcc72cc515438dd309927f059e09143450d6f121232b258660db1297090
-
SSDEEP
6144:aURdZSI5nrUscjLhfKpWrx+5nvyIuT/GODYYTJm4:aU7ZSI5ELkpixsnluT/GOnk4
Static task
static1
Behavioral task
behavioral1
Sample
ec9955db0e61093b92486cf30fe05682f64e97f698283d88c6df88540dd24e82.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
ec9955db0e61093b92486cf30fe05682f64e97f698283d88c6df88540dd24e82
-
Size
371KB
-
MD5
5dc885cbc93b0b51f57804898d5d7e29
-
SHA1
2d49b75f7bb52bd9b634f57034bf4d9bedfa734b
-
SHA256
ec9955db0e61093b92486cf30fe05682f64e97f698283d88c6df88540dd24e82
-
SHA512
c4beb5ddac819f939aed07a0b416efef3d65dbd4a2e339b32858bc6661ad37f27306bbcc72cc515438dd309927f059e09143450d6f121232b258660db1297090
-
SSDEEP
6144:aURdZSI5nrUscjLhfKpWrx+5nvyIuT/GODYYTJm4:aU7ZSI5ELkpixsnluT/GOnk4
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-