General
-
Target
0fb30d1b6a1a605a4bc0cdf92a5840e0852e3595a761e0667fc3e6c77f99f486
-
Size
372KB
-
Sample
240510-pz3qfsae37
-
MD5
82dbf99ae00c7d7c2d31ecdc34952a42
-
SHA1
4e13ccc600813c196f7dbe28f6a5301766bf8cde
-
SHA256
0fb30d1b6a1a605a4bc0cdf92a5840e0852e3595a761e0667fc3e6c77f99f486
-
SHA512
ee4434b16b6730ec4ad97282ffafb43d529646a408244dd81eb7d10b9d1537784a92a37246eefb0b106877368f954ff1aa6a0025e4d95a7d847ed5e33cb0007b
-
SSDEEP
6144:pGPxzYVfryibS0RMb2oP6jZRDu82So+jO8PdCkniwVUBh0V+VtdQT6lXl:pGPx0zzb9RMbP6jZhGSo+jOpiXI2V+VB
Static task
static1
Behavioral task
behavioral1
Sample
0fb30d1b6a1a605a4bc0cdf92a5840e0852e3595a761e0667fc3e6c77f99f486.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
0fb30d1b6a1a605a4bc0cdf92a5840e0852e3595a761e0667fc3e6c77f99f486
-
Size
372KB
-
MD5
82dbf99ae00c7d7c2d31ecdc34952a42
-
SHA1
4e13ccc600813c196f7dbe28f6a5301766bf8cde
-
SHA256
0fb30d1b6a1a605a4bc0cdf92a5840e0852e3595a761e0667fc3e6c77f99f486
-
SHA512
ee4434b16b6730ec4ad97282ffafb43d529646a408244dd81eb7d10b9d1537784a92a37246eefb0b106877368f954ff1aa6a0025e4d95a7d847ed5e33cb0007b
-
SSDEEP
6144:pGPxzYVfryibS0RMb2oP6jZRDu82So+jO8PdCkniwVUBh0V+VtdQT6lXl:pGPx0zzb9RMbP6jZhGSo+jOpiXI2V+VB
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-