General
-
Target
7ceec2cc762930cc62d97a10cfbe8fb4e14070847fdfac1e6ba3aa7e022f7d78
-
Size
372KB
-
Sample
240510-jpvzzaef89
-
MD5
310310bb16aa8aa907755ccf941932da
-
SHA1
875575b9a129cc000ecd7cf746946c52493be93f
-
SHA256
7ceec2cc762930cc62d97a10cfbe8fb4e14070847fdfac1e6ba3aa7e022f7d78
-
SHA512
57ef834e7df28be011c4e047ce1ac1ec499da4cb3d1793370a9382380b649a1855834009c2144b2418ef5e4ae4c7d3d59781407ced5be28389dbc17a44ca584f
-
SSDEEP
6144:oetK0xCObQ2fKaCJVeUg8gSX9THaaQJdHuU+7SH5t6VYTZfm8:oetKRixyaCWDORJQJdHuU+7SZtNZ+8
Static task
static1
Behavioral task
behavioral1
Sample
7ceec2cc762930cc62d97a10cfbe8fb4e14070847fdfac1e6ba3aa7e022f7d78.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
7ceec2cc762930cc62d97a10cfbe8fb4e14070847fdfac1e6ba3aa7e022f7d78
-
Size
372KB
-
MD5
310310bb16aa8aa907755ccf941932da
-
SHA1
875575b9a129cc000ecd7cf746946c52493be93f
-
SHA256
7ceec2cc762930cc62d97a10cfbe8fb4e14070847fdfac1e6ba3aa7e022f7d78
-
SHA512
57ef834e7df28be011c4e047ce1ac1ec499da4cb3d1793370a9382380b649a1855834009c2144b2418ef5e4ae4c7d3d59781407ced5be28389dbc17a44ca584f
-
SSDEEP
6144:oetK0xCObQ2fKaCJVeUg8gSX9THaaQJdHuU+7SH5t6VYTZfm8:oetKRixyaCWDORJQJdHuU+7SZtNZ+8
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-