General
-
Target
e56013351b0b1b00860e198c5b28f295bfe653ebea693966515faac3a3ef2b4a
-
Size
372KB
-
Sample
240510-lyny5agb8z
-
MD5
40f6f52c2bbf836b3aa730e64312600b
-
SHA1
7a1771fba06bafae208d8571346a3011d9940ee6
-
SHA256
e56013351b0b1b00860e198c5b28f295bfe653ebea693966515faac3a3ef2b4a
-
SHA512
01f538ef69606144ff9ca46fac9cf4453df71102d4bc2d745633de6121cdab1e75fafe080cf469048026a271f4309f548aedc48bbbfd691051f1d659152669e0
-
SSDEEP
6144:ipFxc1jv9NVJYCdB7H2CatlcKxtgIxvO6nuotVmUn5f9MyEITzvT7q:ipFxQVTJYcB71YtgIxvO6uorDTL3Tfq
Static task
static1
Behavioral task
behavioral1
Sample
e56013351b0b1b00860e198c5b28f295bfe653ebea693966515faac3a3ef2b4a.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
e56013351b0b1b00860e198c5b28f295bfe653ebea693966515faac3a3ef2b4a
-
Size
372KB
-
MD5
40f6f52c2bbf836b3aa730e64312600b
-
SHA1
7a1771fba06bafae208d8571346a3011d9940ee6
-
SHA256
e56013351b0b1b00860e198c5b28f295bfe653ebea693966515faac3a3ef2b4a
-
SHA512
01f538ef69606144ff9ca46fac9cf4453df71102d4bc2d745633de6121cdab1e75fafe080cf469048026a271f4309f548aedc48bbbfd691051f1d659152669e0
-
SSDEEP
6144:ipFxc1jv9NVJYCdB7H2CatlcKxtgIxvO6nuotVmUn5f9MyEITzvT7q:ipFxQVTJYcB71YtgIxvO6uorDTL3Tfq
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-