General
-
Target
c74b82cbe18818dda7bd45cec4230488c7ab2b8ecda448ccf4ca4e770ae44795
-
Size
372KB
-
Sample
240510-lveahsfh9y
-
MD5
d685c662f929a07345b2b5a599698a21
-
SHA1
3f99f7a8da372f35bad3236c7361f0ecae34b6f5
-
SHA256
c74b82cbe18818dda7bd45cec4230488c7ab2b8ecda448ccf4ca4e770ae44795
-
SHA512
1db5ed20b07190d381804dac29eeefb35a9e8bbed471ea2a648e98273834694a6cad2a630e8845b74a622ab706e035e3e8577600e28f16d63071cf2600bc9a07
-
SSDEEP
6144:ipFxc1jv9NVJYCdB7H2CatlcKxtgIxvO6nuotVmUn5f9MyEITzvT7v:ipFxQVTJYcB71YtgIxvO6uorDTL3Tfv
Static task
static1
Behavioral task
behavioral1
Sample
c74b82cbe18818dda7bd45cec4230488c7ab2b8ecda448ccf4ca4e770ae44795.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
c74b82cbe18818dda7bd45cec4230488c7ab2b8ecda448ccf4ca4e770ae44795
-
Size
372KB
-
MD5
d685c662f929a07345b2b5a599698a21
-
SHA1
3f99f7a8da372f35bad3236c7361f0ecae34b6f5
-
SHA256
c74b82cbe18818dda7bd45cec4230488c7ab2b8ecda448ccf4ca4e770ae44795
-
SHA512
1db5ed20b07190d381804dac29eeefb35a9e8bbed471ea2a648e98273834694a6cad2a630e8845b74a622ab706e035e3e8577600e28f16d63071cf2600bc9a07
-
SSDEEP
6144:ipFxc1jv9NVJYCdB7H2CatlcKxtgIxvO6nuotVmUn5f9MyEITzvT7v:ipFxQVTJYcB71YtgIxvO6uorDTL3Tfv
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-