General
-
Target
27a8b7ed7ad0cd84c0f4233f3c930313c9042d34bfe84677f3f347467f39c696
-
Size
372KB
-
Sample
240510-fc5f4afa79
-
MD5
78004df4224b21ff60ced2bfac05cc35
-
SHA1
446710fb88702a66a90a946aa950766cad33f592
-
SHA256
27a8b7ed7ad0cd84c0f4233f3c930313c9042d34bfe84677f3f347467f39c696
-
SHA512
0c6eeafa7857f63503124e595d6e0ffcd3fabe37a99678b1cac333bef83d993ddf6be8e3348bcde6c93af1241ed746e63f66a70560393cf291d46bdd7457193c
-
SSDEEP
6144:rte+TLYkD9ZWZImNMlYNOYa4JB4B4tTOgAKx9IvdYlhUHmnfKrbZJd:5L9ZWypUsaK4tTO+x9IFYjUGnkbZJd
Static task
static1
Behavioral task
behavioral1
Sample
27a8b7ed7ad0cd84c0f4233f3c930313c9042d34bfe84677f3f347467f39c696.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
27a8b7ed7ad0cd84c0f4233f3c930313c9042d34bfe84677f3f347467f39c696
-
Size
372KB
-
MD5
78004df4224b21ff60ced2bfac05cc35
-
SHA1
446710fb88702a66a90a946aa950766cad33f592
-
SHA256
27a8b7ed7ad0cd84c0f4233f3c930313c9042d34bfe84677f3f347467f39c696
-
SHA512
0c6eeafa7857f63503124e595d6e0ffcd3fabe37a99678b1cac333bef83d993ddf6be8e3348bcde6c93af1241ed746e63f66a70560393cf291d46bdd7457193c
-
SSDEEP
6144:rte+TLYkD9ZWZImNMlYNOYa4JB4B4tTOgAKx9IvdYlhUHmnfKrbZJd:5L9ZWypUsaK4tTO+x9IFYjUGnkbZJd
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-