General
-
Target
fa6b324d5c47965794efa60364058c6e347a8b2693a888bd7bc42a9fdb314793
-
Size
371KB
-
Sample
240510-gaadlsdh2v
-
MD5
e4329dee0206036f75440ca8e71cdc08
-
SHA1
a1567ba91f2d6280dba52cc991896a41153c5675
-
SHA256
fa6b324d5c47965794efa60364058c6e347a8b2693a888bd7bc42a9fdb314793
-
SHA512
8fc4f792fa6caa466b12a024270944c24038adf2220399c19e10aacb11e52112a12197563b84a5672a17440080c8d7f6000a652998b817cc779bed98438576c2
-
SSDEEP
6144:aURdZSI5nrUscjLhfKpWrx+5nvyIuT/GODYYTJm6:aU7ZSI5ELkpixsnluT/GOnk6
Static task
static1
Behavioral task
behavioral1
Sample
fa6b324d5c47965794efa60364058c6e347a8b2693a888bd7bc42a9fdb314793.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
fa6b324d5c47965794efa60364058c6e347a8b2693a888bd7bc42a9fdb314793
-
Size
371KB
-
MD5
e4329dee0206036f75440ca8e71cdc08
-
SHA1
a1567ba91f2d6280dba52cc991896a41153c5675
-
SHA256
fa6b324d5c47965794efa60364058c6e347a8b2693a888bd7bc42a9fdb314793
-
SHA512
8fc4f792fa6caa466b12a024270944c24038adf2220399c19e10aacb11e52112a12197563b84a5672a17440080c8d7f6000a652998b817cc779bed98438576c2
-
SSDEEP
6144:aURdZSI5nrUscjLhfKpWrx+5nvyIuT/GODYYTJm6:aU7ZSI5ELkpixsnluT/GOnk6
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-