General
-
Target
32fa0a62c6bf5d4318a28d9855c79fbe1dde58fe38b8897a8be6fe4699009b8e
-
Size
372KB
-
Sample
240510-lys8vagb9v
-
MD5
6e5cbd57d8fa3fcaf149c2f75c4f542e
-
SHA1
4f83ca866eb64346549b7fe56d640efdde0484d3
-
SHA256
32fa0a62c6bf5d4318a28d9855c79fbe1dde58fe38b8897a8be6fe4699009b8e
-
SHA512
7cdc040288bb740bf4916e947c6e2f9a3a04e4823700ac9d0a743112d3cbe7c6d3b1b31c7b1e1fc2427bcfb3ebc6e6ec8c8dec4ed88672e1164e0028f7a1f9cc
-
SSDEEP
6144:ipFxc1jv9NVJYCdB7H2CatlcKxtgIxvO6nuotVmUn5f9MyEITzvT7s:ipFxQVTJYcB71YtgIxvO6uorDTL3Tfs
Static task
static1
Behavioral task
behavioral1
Sample
32fa0a62c6bf5d4318a28d9855c79fbe1dde58fe38b8897a8be6fe4699009b8e.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
32fa0a62c6bf5d4318a28d9855c79fbe1dde58fe38b8897a8be6fe4699009b8e
-
Size
372KB
-
MD5
6e5cbd57d8fa3fcaf149c2f75c4f542e
-
SHA1
4f83ca866eb64346549b7fe56d640efdde0484d3
-
SHA256
32fa0a62c6bf5d4318a28d9855c79fbe1dde58fe38b8897a8be6fe4699009b8e
-
SHA512
7cdc040288bb740bf4916e947c6e2f9a3a04e4823700ac9d0a743112d3cbe7c6d3b1b31c7b1e1fc2427bcfb3ebc6e6ec8c8dec4ed88672e1164e0028f7a1f9cc
-
SSDEEP
6144:ipFxc1jv9NVJYCdB7H2CatlcKxtgIxvO6nuotVmUn5f9MyEITzvT7s:ipFxQVTJYcB71YtgIxvO6uorDTL3Tfs
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-