General
-
Target
98c560f2f93e76454fe15b03b90477f30f9f5592f98fc195cfffe12543be91f4
-
Size
373KB
-
Sample
240510-prswaahh58
-
MD5
361d123bf50b551a95c5dccc08126c93
-
SHA1
8fe66f0e1f3e3140a1ba56aa04c5919400795a8f
-
SHA256
98c560f2f93e76454fe15b03b90477f30f9f5592f98fc195cfffe12543be91f4
-
SHA512
ee03e3a7d589e14cec9ea33d8058b5c9f23f019cfc24e885a8c8d040e0db1473214ee8664b9720007a996cc6bea975ca7c915bf187189bcced531b6e38b2a06e
-
SSDEEP
6144:Xm7tnXHiPWJ/b1ZPB66To26pxlW0BmbtKjCouJJtqOCFgqIt0TtMf:Xm7tnyOtb1ZZ66TrbqiIFGqmf
Static task
static1
Behavioral task
behavioral1
Sample
98c560f2f93e76454fe15b03b90477f30f9f5592f98fc195cfffe12543be91f4.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
98c560f2f93e76454fe15b03b90477f30f9f5592f98fc195cfffe12543be91f4
-
Size
373KB
-
MD5
361d123bf50b551a95c5dccc08126c93
-
SHA1
8fe66f0e1f3e3140a1ba56aa04c5919400795a8f
-
SHA256
98c560f2f93e76454fe15b03b90477f30f9f5592f98fc195cfffe12543be91f4
-
SHA512
ee03e3a7d589e14cec9ea33d8058b5c9f23f019cfc24e885a8c8d040e0db1473214ee8664b9720007a996cc6bea975ca7c915bf187189bcced531b6e38b2a06e
-
SSDEEP
6144:Xm7tnXHiPWJ/b1ZPB66To26pxlW0BmbtKjCouJJtqOCFgqIt0TtMf:Xm7tnyOtb1ZZ66TrbqiIFGqmf
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-