General
-
Target
92987ab05559a4726c0f828d3734a1abf21c1ed7d882bd1974bccba82d4a9a4a
-
Size
372KB
-
Sample
240510-p8fbhsbb23
-
MD5
227233ef32f5c368b4f4727121033701
-
SHA1
ad7d3be13667a71bad7fe85858a5933909e30e6b
-
SHA256
92987ab05559a4726c0f828d3734a1abf21c1ed7d882bd1974bccba82d4a9a4a
-
SHA512
b8bc7901587ed4af9ba29df1da7f7bdb46a3df4e50b937433f0fc936d37253232a565080d9c151736e015ff6fbd68592a0584c4c02fe266cc38d71bd73ef8e98
-
SSDEEP
6144:pGPxzYVfryibS0RMb2oP6jZRDu82So+jO8PdCkniwVUBh0V+VtdQT6lXo:pGPx0zzb9RMbP6jZhGSo+jOpiXI2V+VM
Static task
static1
Behavioral task
behavioral1
Sample
92987ab05559a4726c0f828d3734a1abf21c1ed7d882bd1974bccba82d4a9a4a.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
92987ab05559a4726c0f828d3734a1abf21c1ed7d882bd1974bccba82d4a9a4a
-
Size
372KB
-
MD5
227233ef32f5c368b4f4727121033701
-
SHA1
ad7d3be13667a71bad7fe85858a5933909e30e6b
-
SHA256
92987ab05559a4726c0f828d3734a1abf21c1ed7d882bd1974bccba82d4a9a4a
-
SHA512
b8bc7901587ed4af9ba29df1da7f7bdb46a3df4e50b937433f0fc936d37253232a565080d9c151736e015ff6fbd68592a0584c4c02fe266cc38d71bd73ef8e98
-
SSDEEP
6144:pGPxzYVfryibS0RMb2oP6jZRDu82So+jO8PdCkniwVUBh0V+VtdQT6lXo:pGPx0zzb9RMbP6jZhGSo+jOpiXI2V+VM
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-